Windows Analysis Report
https://u43197812.ct.sendgrid.net/ls/click?upn=u001.TgFW-2BQD-2FE7yMaclzIJQwn9qZF3-2FXzpRvXEX0tzW6EB6gW8DDwAKUWABjk0Cpq-2Fdz4M57xGIo5-2F6KKAb29fluuw-3D-3DTs77_rO-2FlG9aNEfOODMQQnJrFgo3hymD2kiOmvLq7huX3fN9kYkz1gV86mx1on2uqoUekik3S0U5MQ-2BxcTxAAAQVsKocjCr5fk64t9c-2BiBkNJXy814oSZh73tt0nhb1jvW2xtial-2FO

Overview

General Information

Sample URL: https://u43197812.ct.sendgrid.net/ls/click?upn=u001.TgFW-2BQD-2FE7yMaclzIJQwn9qZF3-2FXzpRvXEX0tzW6EB6gW8DDwAKUWABjk0Cpq-2Fdz4M57xGIo5-2F6KKAb29fluuw-3D-3DTs77_rO-2FlG9aNEfOODMQQnJrFgo3hymD2kiOmvLq7huX
Analysis ID: 1417101

Detection

Score: 0
Range: 0 - 100
Whitelisted: false
Confidence: 80%

Signatures

Stores files to the Windows start menu directory

Classification

Source: https://u43197812.ct.sendgrid.net/ls/click?upn=u001.TgFW-2BQD-2FE7yMaclzIJQwn9qZF3-2FXzpRvXEX0tzW6EB6gW8DDwAKUWABjk0Cpq-2Fdz4M57xGIo5-2F6KKAb29fluuw-3D-3DTs77_rO-2FlG9aNEfOODMQQnJrFgo3hymD2kiOmvLq7huX3fN9kYkz1gV86mx1on2uqoUekik3S0U5MQ-2BxcTxAAAQVsKocjCr5fk64t9c-2BiBkNJXy814oSZh73tt0nhb1jvW2xtial-2FOsgz3g0mSHtIRCFl5GrdLWROfg4NHudyZFT9PzdpDy9ws7m-2FBCMZU8k2-2B1CQBE7tuMnHvmEFc-2BemeBWNkvmjrwhbxK-2FKMSGu6rwTB3Y-3D HTTP Parser: No favicon
Source: unknown HTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49706 version: TLS 1.2
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.200
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknown TCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknown DNS traffic detected: queries for: u43197812.ct.sendgrid.net
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49697
Source: unknown Network traffic detected: HTTP traffic on port 49673 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49706 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49696
Source: unknown Network traffic detected: HTTP traffic on port 49696 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49697 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49701 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49688 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49706
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49701
Source: unknown HTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.16:49706 version: TLS 1.2
Source: classification engine Classification label: clean0.win@13/8@4/19
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: unknown Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://u43197812.ct.sendgrid.net/ls/click?upn=u001.TgFW-2BQD-2FE7yMaclzIJQwn9qZF3-2FXzpRvXEX0tzW6EB6gW8DDwAKUWABjk0Cpq-2Fdz4M57xGIo5-2F6KKAb29fluuw-3D-3DTs77_rO-2FlG9aNEfOODMQQnJrFgo3hymD2kiOmvLq7huX3fN9kYkz1gV86mx1on2uqoUekik3S0U5MQ-2BxcTxAAAQVsKocjCr5fk64t9c-2BiBkNJXy814oSZh73tt0nhb1jvW2xtial-2FOsgz3g0mSHtIRCFl5GrdLWROfg4NHudyZFT9PzdpDy9ws7m-2FBCMZU8k2-2B1CQBE7tuMnHvmEFc-2BemeBWNkvmjrwhbxK-2FKMSGu6rwTB3Y-3D
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1976,i,4353144744606916921,267135791406568542,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1976,i,4353144744606916921,267135791406568542,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe Process created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
Source: C:\Program Files\Google\Chrome\Application\chrome.exe File created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs