Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 12:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://plc.lianwangbao.com/download/wangkoutong/wangkoutong_setup_10.0.zip
Resource
win10v2004-20240730-en
General
-
Target
http://plc.lianwangbao.com/download/wangkoutong/wangkoutong_setup_10.0.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 3308 msedge.exe 3308 msedge.exe 1564 identity_helper.exe 1564 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3308 wrote to memory of 552 3308 msedge.exe 83 PID 3308 wrote to memory of 552 3308 msedge.exe 83 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 1688 3308 msedge.exe 84 PID 3308 wrote to memory of 2496 3308 msedge.exe 85 PID 3308 wrote to memory of 2496 3308 msedge.exe 85 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86 PID 3308 wrote to memory of 456 3308 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://plc.lianwangbao.com/download/wangkoutong/wangkoutong_setup_10.0.zip1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbc5f046f8,0x7ffbc5f04708,0x7ffbc5f047182⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1544 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,11490970005774543533,16960317956973480366,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:4648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ea9ef805116c4ab90b5800c7cd94ab71
SHA1eb9c7b8922c8ef79eef1009ab7f530bb57fbbbea
SHA256bff3e3629de76b8b8dd001c3d8fb986e841c392dfe1982081751b92f5bd567b0
SHA5128c907d2616ce16cfe08ddeb632f93402e765c5d9430a46e90ab5ea32d4df0a854c6007b19f9b0168254ab7aadf720fed8c68d1a055704db09c1b36c201a9b3b9
-
Filesize
152B
MD5347755403306a2694773b0c232d3ab2c
SHA194d908aa90533fcaef3f1eb5aa93fee183d5f6ac
SHA256d43f2dd4ac5b6ba779100eb8b84bc92fc8700bedcd339a801c5260b1bb3ce3bf
SHA51298f1fb18bc34dfc224132dfa2a2e6a131b280b25fcb516fac3bb66da2a47c7a7061124881de6fa5f65602663dc0ea71357b171a3346bb1514176943438322253
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\358eb3e0-50f5-4d8d-938c-197cc2ed61e9.tmp
Filesize6KB
MD544a3e798e9729ce784455b4caa87a6a8
SHA17238f51530971bbe16b954e130c61056b2a31099
SHA256a552974ae27755efbbd5974ed14b245158abe05f7db0db84752dccc5d78dbcc4
SHA51214e85b85b7bfd492edb7e6dddf47b5707a979617812454e2340650cb7c39f7e61731e998b903434fed4f19936bb04077d75ca23e5b719f71847b38bb96e57857
-
Filesize
6KB
MD5b0e2132f9bdd68df137291ab161fa386
SHA1cf8822e36fe0624c497b64bb27f313c8d5338717
SHA256ca048bc407571f59899019e9043480d81c5566fff0f1cfc12567ed14f061a929
SHA51285cd916ab03d26c83469f1a10f85c81652ddf6b44d903104acc7e89d16ba5c9786651fa97ca3f03f4fea8c27e2bd724a8baa04548da36b6f57ab6d4cb84aeda7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5171ba8dba759ecf0a7b408d26826aa32
SHA1d41e82f776cbbef5948c7cbff8f4e22e7c8f0aa4
SHA256722634a9eccce384cc929304c4fb9e21fd31b7c47395824cf9062ca9e721d5c3
SHA512d96e36e4da063a5161a355c6a473975963dec223cf57c0c499270e0ebb0924930de05b6aa9d1e24f409cdee404e276e30cfa00dbf0bf1d868168461736c8e2f8