Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2023 21:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.tata.com/business/tata-electronics
Resource
win10v2004-20231127-en
General
-
Target
https://www.tata.com/business/tata-electronics
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4320 msedge.exe 4320 msedge.exe 4104 msedge.exe 4104 msedge.exe 2536 identity_helper.exe 2536 identity_helper.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4104 wrote to memory of 1664 4104 msedge.exe 26 PID 4104 wrote to memory of 1664 4104 msedge.exe 26 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 1496 4104 msedge.exe 85 PID 4104 wrote to memory of 4320 4104 msedge.exe 84 PID 4104 wrote to memory of 4320 4104 msedge.exe 84 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86 PID 4104 wrote to memory of 656 4104 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.tata.com/business/tata-electronics1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5fb546f8,0x7ffd5fb54708,0x7ffd5fb547182⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,12849324911144137353,18277886321533319790,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59757335dca53b623d3211674e1e5c0e3
SHA1d66177f71ab5ed83fefece6042269b5b7cd06e72
SHA25602f0348e2af36f2955efda1613dc6480f1c68c8e55f19590b7b58e9355c6a940
SHA512f13351398f5dd5b6cf638b174dc50ddc782b690c6d4736d48941923a3425b5dff4a9aa0da22773e9abc9559d40f020f268018db902e0a7772b7b1f4d21126f21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD54890f11f752fc5612a784bb2bc07434a
SHA1817e1a9f5228371ec5cc0749bd0beef3b9278b8d
SHA2560e2798819b4a7fc29b6c171455199912c461faa02b1f525e4956f2aef86be910
SHA5124f76797949d8685c86134ddbca54e25fccaeae6e0ce2d28fa129ee53e1119be744ea7295313ab977b0a1f2c1d78fda688fc8854a028ee70222794e899feaea63
-
Filesize
1KB
MD51f14f2ba9bf1795f800403103c04a313
SHA14dab407920d766c55c2cf111bca0ddc845282eff
SHA256d19f88a74e68de15e9fb073ead4cf2f712c0ee59f73d61591bb707383a515769
SHA51259fa0a969af31fe35bff54ee8f976087c65ddeb563cdf57bcdf4c9f8c8b1f6695db397b1ef8b2d8fd91ad40d5cb9640806ab87d9ec728435e04713bf669fae73
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD57774ac1e1758c3065fc57d09a43ec06e
SHA12993a51b14192be9b3458a1bacd16622add2549a
SHA2560400333bd42e7054443c643e2e6fe6573e4733b08c4a93d1a62d04a2855e16e6
SHA512768b0d8fd6b0108922c58e94c551fb9df9197b7e7a05c8e7b28ec583564d09faee166c4a816fc11e1d81f41bec7fe8d89759c65013d1fc667935d79199928618
-
Filesize
5KB
MD5b770dc9aa770e67265f10334696e2f8e
SHA1f978024933be749963b11d5a8b0c48392af06004
SHA256b436963af52c6c7b15705b7c0962bcb627a4cb00f52d1bd1d4f94f4dd74a0225
SHA5128c04ead8e15f8b7a369685f960dfde7019908c769a12f577c3735eeaae223d984343e1b145b7efdb38a4d1a521d76807c4076e547ae5a9bd1460b91ae504ff12
-
Filesize
24KB
MD5c0499655f74785ff5fb5b5abf5b2f488
SHA1334f08bdb5d7564d1b11e543a2d431bd05b8bdd1
SHA2566aa332a4d21802b2dbcd08e153764da60f538ceb0daaaaf7504ba8f67c08ef03
SHA5125f0cec6dd823f2b3ac62017383dbbf71ed38893724312ec75e73fb197e0bcd5418bb70fdfe9150f5ca495d5f8547d8a08618bdacb5010514a3cb1101437d698e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD520bd0fccbaa4b26fd32c9cc94fec1d6f
SHA16873548a231d9e4c27d02a28eed363a5e82c4184
SHA256e6a5997867d7597b345a78d9cfc0780ca289ebca1857ecd45d442e5b5442835e
SHA51227a0e2d6b73a59e03c0632dd18085e88bc557da323d6c789d19041f0a43194bfcd24870c908d300269c1f76cac174a37d8c64751320027b9edc5a0db0b3d3f7c