analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://back-to-top.appspot.com

Full analysis: https://app.any.run/tasks/6c0d1b8f-e7b7-48bf-98fd-1c814cb9e703
Verdict: Malicious activity
Analysis date: June 27, 2022, 10:53:31
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

9CA4E8C252A99B4D2C22F8AB630ABA42

SHA1:

8E06E213590C21610CA2755D2A9E2C23EC1145CF

SHA256:

2F685C343785A3B06D58CF311B0E2A5F223FBF2414E0BABD1AF51337B91571A6

SSDEEP:

3:N8pRKrVEkn:2CrXn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3468)
      • iexplore.exe (PID: 1156)
    • Executed as Windows Service

      • IEEtwCollector.exe (PID: 2396)
    • Creates files in the Windows directory

      • IEEtwCollector.exe (PID: 2396)
    • Reads the time zone

      • IEEtwCollector.exe (PID: 2396)
    • Removes files from Windows directory

      • IEEtwCollector.exe (PID: 2396)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 3468)
      • iexplore.exe (PID: 3008)
      • iexplore.exe (PID: 1156)
      • IEEtwCollector.exe (PID: 2396)
    • Reads the computer name

      • iexplore.exe (PID: 3008)
      • iexplore.exe (PID: 3468)
      • iexplore.exe (PID: 1156)
      • IEEtwCollector.exe (PID: 2396)
    • Changes internet zones settings

      • iexplore.exe (PID: 3008)
    • Application launched itself

      • iexplore.exe (PID: 3008)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3468)
      • iexplore.exe (PID: 3008)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3468)
      • iexplore.exe (PID: 3008)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3468)
      • iexplore.exe (PID: 1156)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3008)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3008)
    • Reads CPU info

      • IEEtwCollector.exe (PID: 2396)
    • Creates files in the user directory

      • iexplore.exe (PID: 3008)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
4
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe iexplore.exe no specs ieetwcollector.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3008"C:\Program Files\Internet Explorer\iexplore.exe" "https://back-to-top.appspot.com"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
3468"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3008 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
1156"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3008 CREDAT:595215 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
2396C:\Windows\system32\IEEtwCollector.exe /VC:\Windows\system32\IEEtwCollector.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
IE ETW Collector Service
Exit code:
0
Version:
11.00.9600.19597 (winblue_ltsb_escrow.191216-1311)
Total events
14 504
Read events
14 365
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
10
Text files
18
Unknown types
6

Dropped files

PID
Process
Filename
Type
3468iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_6EAEAF21CE6A8CBF87BDB6F0C7149891der
MD5:488D7FF7982ED89CA6B9F277BF55538C
SHA256:12BA52E6BFA1C7D3E85767EEA98A5C3AE1E55F253E25F133AAABB846295B7C5F
3468iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAder
MD5:5A11C6099B9E5808DFB08C5C9570C92F
SHA256:91291A5EDC4E10A225D3C23265D236ECC74473D9893BE5BD07E202D95B3FB172
3468iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_6EAEAF21CE6A8CBF87BDB6F0C7149891binary
MD5:65C2516FB898B4298C1C7C2F2938F484
SHA256:ECD98279854ADBCB058FF7B2709A72F5814FBE7CAB4435E897BC17BBEEBB7CE2
3008iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:41AAD2BCEA49340C00763F4AF43AF60B
SHA256:77936C544D07C9654CFD4A230EBF846483384D10E381A5E5FC0AEE9BD2F51DB4
3468iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAbinary
MD5:55103DE89E705D4418B4376DE816CA8D
SHA256:470291F75B07C762EC91EB1F522F5ADB5A0FB8CBCFFE01E77CB92720286B61D0
3008iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\82CB34DD3343FE727DF8890D352E0D8Fder
MD5:DF6DEECBA36F8D0AF53EAFA9C51AB1F7
SHA256:60D1053BDE5FBCA23ED8976F1EABAEE9C4BB459D9C997E5A76BB2182EE916D98
3008iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\82CB34DD3343FE727DF8890D352E0D8Fbinary
MD5:C63076014FD6536FEE568BC5FB63B9EB
SHA256:6A3B21A99A39BADE570DA485E7E84B620E1646CFD8CE941C9A594E3C6F94746F
3468iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:8B4309828E6EB10E7F3E1615180AD01A
SHA256:06B6991DDC450993F0FD0DC169D4FFB856F15766EA41F50AFCB4F15EE2D9FA14
3468iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:04871A11D3099F69C0D7F6671EC231CD
SHA256:E5DD55372CF8703B0DFA6E943F09AFAC0022538E5E6B6B074E3F47D7B5EEFE2F
3468iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:3D798C0A1525AB1536CB7E82146B88D9
SHA256:907504AA835B96BE456AA8F9F73C1B2D14A3EE806EF2DEF963815165F2CD1CF1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
28
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3468
iexplore.exe
GET
200
216.58.212.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
3468
iexplore.exe
GET
200
216.58.212.131:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQDIl%2Fivkhn0AhD%2B9htusp2z
US
der
472 b
whitelisted
3468
iexplore.exe
GET
200
216.58.212.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
3008
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
3008
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
3008
iexplore.exe
GET
200
93.184.220.29:80
http://crl3.digicert.com/Omniroot2025.crl
US
der
7.78 Kb
whitelisted
3468
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?84e65fa95d72fa7a
US
compressed
4.70 Kb
whitelisted
3468
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?22d680452c1be668
US
compressed
4.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3468
iexplore.exe
142.250.186.148:443
back-to-top.appspot.com
Google Inc.
US
suspicious
3008
iexplore.exe
142.250.186.148:443
back-to-top.appspot.com
Google Inc.
US
suspicious
3008
iexplore.exe
13.107.22.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3008
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3468
iexplore.exe
216.58.212.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3468
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3008
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3008
iexplore.exe
204.79.197.200:443
ieonline.microsoft.com
Microsoft Corporation
US
whitelisted
3008
iexplore.exe
96.16.143.41:443
go.microsoft.com
Akamai International B.V.
US
whitelisted
3008
iexplore.exe
20.25.53.147:443
query.prod.cms.msn.com
US
unknown

DNS requests

Domain
IP
Reputation
back-to-top.appspot.com
  • 142.250.186.148
suspicious
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.pki.goog
  • 216.58.212.131
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.22.200
  • 131.253.33.200
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
ieonline.microsoft.com
  • 204.79.197.200
whitelisted

Threats

No threats detected
No debug info