Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 11:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://plc.lianwangbao.com/download/wangkoutong/wangkoutong_setup_10.0.zip
Resource
win10v2004-20240730-en
General
-
Target
http://plc.lianwangbao.com/download/wangkoutong/wangkoutong_setup_10.0.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2616 msedge.exe 2616 msedge.exe 3652 msedge.exe 3652 msedge.exe 2028 identity_helper.exe 2028 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3652 wrote to memory of 1764 3652 msedge.exe 84 PID 3652 wrote to memory of 1764 3652 msedge.exe 84 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2276 3652 msedge.exe 85 PID 3652 wrote to memory of 2616 3652 msedge.exe 86 PID 3652 wrote to memory of 2616 3652 msedge.exe 86 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87 PID 3652 wrote to memory of 540 3652 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://plc.lianwangbao.com/download/wangkoutong/wangkoutong_setup_10.0.zip1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c24846f8,0x7ff9c2484708,0x7ff9c24847182⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1541041441289050499,6795420186936106368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:1428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50dc31145339977b457eec605c4e1a567
SHA1deb6ff8183afdaafd849858c821af52f93936e1c
SHA2564b1ef876e1d4f2c9726b7b966222c336d0be026c588178ad40ab476be4d353ec
SHA512ef095404247530ade966bae7d6920f0ff060852e3dfb545f4bbca384f88d0e2a4622b55e4b856ab63f6e6c56196a8ad1257711b53a2fcdd89962d1252b6c4e17
-
Filesize
152B
MD531f5155eeaa8631c1c80614efb4e73cd
SHA1aac054ba3a9bd71bb2644cc541aad11a5f119017
SHA2567e0833f04bdc7ed7a88940d793f110d199368d7c2ca55eabb154de84a355d7cf
SHA51294c43c4e59ae3745fee5157852c279110de2f89dd1562c47627ef960a70790db0b713155817ac7ac636e43f0218f73d35c915f9de61df019ba65c09730a21452
-
Filesize
6KB
MD5252b2838ca3b6fbdd45e16f387b4815f
SHA115c51892ef0a0f6ec2047fda8ba29ef4e6b8b07a
SHA256ceba9d5d7b0047dfa486283d12e1c4b82ed9dfc9e9b741469642bce69b15b9a4
SHA512903e0a5020e7f597a8b474f3f0fb49bd874ce9f6305004da70d2183b8fefb57cac9d6cce7a74285139c582b1aec9c470a9abbbc339f9b0e471a9984d636273ed
-
Filesize
6KB
MD5417b8bfc01047a3daccc218df26a184e
SHA1902aec439e1fbeab0636d9895c37e15d0d9bc8a0
SHA256075948adf69f022683e13260df255a4112d8b72a5a42e879578d9ea0c75cc500
SHA512dae90251e92baca4799ae6d0cb3a49a01e813ff4b3495a73aa3144dbb2827535f54947a67e20b4a8706791f0cf23e51428922f54a884e670c9176e0af0851494
-
Filesize
6KB
MD56a8e32d8146d7a4bfef86dafb411dc03
SHA1e6ada7512ebb01c67586ca69d1d9e9d3de29d541
SHA256c1d54aa30c5561946949688c9dded7b4b0a33c6b07a126480707fb02edc04a19
SHA5127de411972f1880f3700870454a8fe22d4cf143cd9893b25f29c85e07cef7e54fee11267a8c012b8e0a4595a8cdfd8078295763489e388259ee65154145386bfa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5340adf2f8374908cdcded2ae07079ecc
SHA16a8b59ca3b687a5cf5f97cb2ccf539a86d5d0f9f
SHA256888dc17d4dd0df9c907ce0603a5ea441473108d83353311f7f86062646eaa4c4
SHA5120968fe0ea823fd0397b53afd9e7add05a51aa764097f9f5ecf9db00bb4207d6e4ab6fe78aa8cd8a519e0461b09efad51bc434a7f223f83a6f62a9c28084f7b26
-
Filesize
10KB
MD5572a9f936f3b64b3bbbf0d958b7d6d6e
SHA128b0495212cd2c8fffe568f26dac5ab3ecb7b81f
SHA25676d9333dee5454aeeecf990ec44d919b2131b473393e1de629ac2c7bde79181c
SHA5127a220a14ba83a8bfdd2d6ff8e13d269f3746630e6a16a9682b6e870689c000a87d73b4f483ae0e4812b4877d016f2dc621c556c34d103e5fe111c78b08f9b841
-
Filesize
264KB
MD5be65a7d31b2d516c09ec394364f54f58
SHA111f07ab66ff0f9eebfa9152c37f22cbe35cbb77c
SHA25638bf5d09cfa65910ca9437bc17da4d9ab2f2d72a28aa553940bb4faae30aa816
SHA51236248c9050d01b4d2ab1abd41dc7001e9ee9d6a980f8248850060311478ebc24ff34aace982742c99571311494c396d056151e28fc0ba3ffde291e0bba5559ef