Windows Analysis Report
https://u43197812.ct.sendgrid.net/ls/click?upn=u001.TgFW-2BQD-2FE7yMaclzIJQwn2gZp4Ko57ZbhEbMldWWuXI-3DsNV1_rO-2FlG9aNEfOODMQQnJrFgo3hymD2kiOmvLq7huX3fN-2FZMOiELWg6xPIPz3yjjvNM3yZjYDXC6aChn5P-2B-2FMZ75G5bwfWuf0DsrgRzZRIDIV-2B6FR6V7O4vQhAMDldMBz-2F8lWrt7xt0TZZJbnB8Ol21hU4FjlBQUqNUb7Jc6a70xKxYMThtW-2Fs

Overview

General Information

Sample URL: https://u43197812.ct.sendgrid.net/ls/click?upn=u001.TgFW-2BQD-2FE7yMaclzIJQwn2gZp4Ko57ZbhEbMldWWuXI-3DsNV1_rO-2FlG9aNEfOODMQQnJrFgo3hymD2kiOmvLq7huX3fN-2FZMOiELWg6xPIPz3yjjvNM3yZjYDXC6aChn5P-2B-2FMZ75
Analysis ID: 1417072

Detection

Score: 0
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

Stores files to the Windows start menu directory

Classification

Source: https://u43197812.ct.sendgrid.net/ls/click?upn=u001.TgFW-2BQD-2FE7yMaclzIJQwn2gZp4Ko57ZbhEbMldWWuXI-3DsNV1_rO-2FlG9aNEfOODMQQnJrFgo3hymD2kiOmvLq7huX3fN-2FZMOiELWg6xPIPz3yjjvNM3yZjYDXC6aChn5P-2B-2FMZ75G5bwfWuf0DsrgRzZRIDIV-2B6FR6V7O4vQhAMDldMBz-2F8lWrt7xt0TZZJbnB8Ol21hU4FjlBQUqNUb7Jc6a70xKxYMThtW-2FsIJGX9OPGqP2rnBFwFkJXenK1ZR8bwkSjT-2FKaCPzz2NADjwJrvwhuWO-2FY-3D HTTP Parser: No favicon
Source: unknown HTTPS traffic detected: 23.54.46.90:443 -> 192.168.2.16:49709 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.54.46.90:443 -> 192.168.2.16:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49712 version: TLS 1.2
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 23.54.46.90
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknown TCP traffic detected without corresponding DNS query: 13.107.21.200
Source: unknown TCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknown TCP traffic detected without corresponding DNS query: 20.189.173.10
Source: unknown TCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknown TCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknown TCP traffic detected without corresponding DNS query: 192.229.211.108
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown TCP traffic detected without corresponding DNS query: 13.85.23.86
Source: unknown DNS traffic detected: queries for: u43197812.ct.sendgrid.net
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49711
Source: unknown Network traffic detected: HTTP traffic on port 49709 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49710 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49710
Source: unknown Network traffic detected: HTTP traffic on port 49673 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49707 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49712 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49711 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49678 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49703 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49689 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49709
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49707
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49703
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49712
Source: unknown HTTPS traffic detected: 23.54.46.90:443 -> 192.168.2.16:49709 version: TLS 1.2
Source: unknown HTTPS traffic detected: 23.54.46.90:443 -> 192.168.2.16:49710 version: TLS 1.2
Source: unknown HTTPS traffic detected: 13.85.23.86:443 -> 192.168.2.16:49712 version: TLS 1.2
Source: classification engine Classification label: clean0.win@13/8@4/11
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://u43197812.ct.sendgrid.net/ls/click?upn=u001.TgFW-2BQD-2FE7yMaclzIJQwn2gZp4Ko57ZbhEbMldWWuXI-3DsNV1_rO-2FlG9aNEfOODMQQnJrFgo3hymD2kiOmvLq7huX3fN-2FZMOiELWg6xPIPz3yjjvNM3yZjYDXC6aChn5P-2B-2FMZ75G5bwfWuf0DsrgRzZRIDIV-2B6FR6V7O4vQhAMDldMBz-2F8lWrt7xt0TZZJbnB8Ol21hU4FjlBQUqNUb7Jc6a70xKxYMThtW-2FsIJGX9OPGqP2rnBFwFkJXenK1ZR8bwkSjT-2FKaCPzz2NADjwJrvwhuWO-2FY-3D
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1968,i,7207384205308198880,2207463515112844000,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2028 --field-trial-handle=1968,i,7207384205308198880,2207463515112844000,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs