URL:

http://glogg.bonnefon.org/files/glogg-latest-x86_64-setup.exe

Full analysis: https://app.any.run/tasks/3b5c11be-4238-46d2-970b-4037c0165391
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: September 26, 2019, 10:38:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
opendir
loader
Indicators:
MD5:

6D2AC543B6E6AD31FE8CB5BA359DBB72

SHA1:

7A69CC872C5AF883DA02F894E2A2733245C3E98F

SHA256:

B11EFFB5AFE1E475DF68495C58A79B08B7D7E4E2C7C3AC630CFFE6640AC71DEC

SSDEEP:

3:N1KZJ88LADQfhONAEkA:CsamIIkA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • glogg-latest-x86_64-setup.exe (PID: 3008)
      • glogg-latest-x86_64-setup.exe (PID: 3588)
    • Downloads executable files from the Internet

      • opera.exe (PID: 3160)
    • Loads dropped or rewritten executable

      • glogg-latest-x86_64-setup.exe (PID: 3588)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • opera.exe (PID: 3160)
      • glogg-latest-x86_64-setup.exe (PID: 3588)
    • Creates files in the program directory

      • glogg-latest-x86_64-setup.exe (PID: 3588)
    • Creates files in the user directory

      • glogg-latest-x86_64-setup.exe (PID: 3588)
    • Creates a software uninstall entry

      • glogg-latest-x86_64-setup.exe (PID: 3588)
    • Modifies the open verb of a shell class

      • glogg-latest-x86_64-setup.exe (PID: 3588)
  • INFO

    • Creates files in the user directory

      • opera.exe (PID: 3160)
    • Manual execution by user

      • glogg-latest-x86_64-setup.exe (PID: 3588)
      • glogg-latest-x86_64-setup.exe (PID: 3008)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start opera.exe glogg-latest-x86_64-setup.exe no specs glogg-latest-x86_64-setup.exe

Process information

PID
CMD
Path
Indicators
Parent process
3008"C:\Users\admin\Desktop\glogg-latest-x86_64-setup.exe" C:\Users\admin\Desktop\glogg-latest-x86_64-setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\glogg-latest-x86_64-setup.exe
c:\systemroot\system32\ntdll.dll
3160"C:\Program Files\Opera\opera.exe" "http://glogg.bonnefon.org/files/glogg-latest-x86_64-setup.exe"C:\Program Files\Opera\opera.exe
explorer.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Exit code:
0
Version:
1748
Modules
Images
c:\program files\opera\opera.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
3588"C:\Users\admin\Desktop\glogg-latest-x86_64-setup.exe" C:\Users\admin\Desktop\glogg-latest-x86_64-setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\glogg-latest-x86_64-setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
890
Read events
753
Write events
135
Delete events
2

Modification events

(PID) Process:(3160) opera.exeKey:HKEY_CURRENT_USER\Software\Opera Software
Operation:writeName:Last CommandLine v2
Value:
C:\Program Files\Opera\opera.exe "http://glogg.bonnefon.org/files/glogg-latest-x86_64-setup.exe"
(PID) Process:(3160) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\72\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3160) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(3160) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
02000000070000000100000009000000080000000000000006000000030000000500000004000000FFFFFFFF
(PID) Process:(3160) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlg
Operation:writeName:TV_FolderType
Value:
{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}
(PID) Process:(3160) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlg
Operation:writeName:TV_TopViewID
Value:
{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
(PID) Process:(3160) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\50\ComDlg
Operation:writeName:TV_TopViewVersion
Value:
0
(PID) Process:(3160) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:Mode
Value:
4
(PID) Process:(3160) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:LogicalViewMode
Value:
1
(PID) Process:(3160) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}
Operation:writeName:FFlags
Value:
1092616257
Executable files
13
Suspicious files
24
Text files
9
Unknown types
2

Dropped files

PID
Process
Filename
Type
3160opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\opr1474.tmp
MD5:
SHA256:
3160opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opr1485.tmp
MD5:
SHA256:
3160opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opr14C4.tmp
MD5:
SHA256:
3160opera.exeC:\Users\admin\AppData\Local\Opera\Opera\cache\sesn\opr00002.tmp
MD5:
SHA256:
3160opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AR06UC9SQHFIQL156WD4.temp
MD5:
SHA256:
3160opera.exeC:\Users\admin\AppData\Local\Opera\Opera\cache\CACHEDIR.TAGtext
MD5:E717F92FA29AE97DBE4F6F5C04B7A3D9
SHA256:5BBD5DCBF87FD8CD7544C522BADF22A2951CF010AD9F25C40F9726F09EA2B552
3160opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\16ec093b8f51508f.customDestinations-ms~RF103347.TMPbinary
MD5:
SHA256:
3160opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\16ec093b8f51508f.customDestinations-msbinary
MD5:
SHA256:
3160opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\download.datbinary
MD5:
SHA256:
3160opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\operaprefs.initext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
5
DNS requests
4
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3160
opera.exe
GET
200
163.172.171.152:80
http://glogg.bonnefon.org/files/glogg-latest-x86_64-setup.exe
FR
executable
6.47 Mb
suspicious
3160
opera.exe
GET
400
107.167.110.216:80
http://sitecheck2.opera.com/?host=glogg.bonnefon.org&hdn=mm8gMLVPbgbgOjfv0j616w==
US
html
150 b
whitelisted
3160
opera.exe
GET
200
93.184.220.29:80
http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl
US
der
528 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3160
opera.exe
163.172.171.152:80
glogg.bonnefon.org
Online S.a.s.
FR
suspicious
3160
opera.exe
107.167.110.216:80
sitecheck2.opera.com
Opera Software Americas LLC
US
malicious
3160
opera.exe
185.26.182.94:443
certs.opera.com
Opera Software AS
whitelisted
3160
opera.exe
93.184.220.29:80
crl4.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
glogg.bonnefon.org
  • 163.172.171.152
suspicious
sitecheck2.opera.com
  • 107.167.110.216
  • 107.167.110.211
whitelisted
certs.opera.com
  • 185.26.182.94
  • 185.26.182.93
whitelisted
crl4.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
3160
opera.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info