cozaghost.exe

Jambo Digital Ltd

The application cozaghost.exe by Jambo Digital has been detected as adware by 7 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “cozaghost”.
Publisher:
Tester Extension  (signed by Jambo Digital Ltd)

Product:
Tester Extension

Version:
1.1.0.29

MD5:
2153cd186d22e210cb4223c0fcbf0e60

SHA-1:
89cd098e2d52e4596c58acc72868ecd01c3cb31c

SHA-256:
7d9401f6bf7a643ea7f674726a2c6e9e1d832916443a2501ebf27d013a31eb2d

Scanner detections:
7 / 68

Status:
Adware

Analysis date:
12/24/2024 3:22:45 PM UTC  (today)

Scan engine
Detection
Engine version

IKARUS anti.virus
AdWare.Win32.PennyBee
t3scan.1.8.6.0

Malwarebytes
PUP.Optional.Zoomify.A
v2015.01.13.08

McAfee
Artemis!2153CD186D22
5600.6886

Microsoft Security Essentials
Adware:Win32/PennyBee
1.11302

Reason Heuristics
Adware.Jambo.Zoomify.Service
15.1.13.20

Sophos
Zoomify
4.98

Trend Micro House Call
Suspicious_GEN.F47V1231
7.2.13

File size:
459.5 KB (470,560 bytes)

Product version:
1.1.0.29

Copyright:
Copyright © 2014, All rights Reserved

Original file name:
Tester.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\zoomify_29\1.1.0.29\cozaghost.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
5/27/2014 8:00:00 PM

Valid to:
5/27/2017 7:59:59 PM

Subject:
CN=Jambo Digital Ltd, OU=Jambo Digital Ltd, O=Jambo Digital Ltd, STREET=2 Kaufman Yehezkel, STREET=tel aviv, L=tel aviv, S=TEL AVIV-JAFFA, PostalCode=6801294, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00C458EED8E9EAA77E97499968CD5DD6B9

File PE Metadata
Compilation timestamp:
12/24/2014 11:18:38 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:YNkLUHrRkQk63Jg4M0C6q4APC06dz8ZEpZmNMPA20:YOLUHrfk65gX/P606WZimNMPy

Entry address:
0x34CF4

Entry point:
E8, 46, FE, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 10, A1, 50, 37, 46, 00, 33, C5, 89, 45, FC, 8B, 55, 18, 53, 33, DB, 56, 57, 3B, D3, 7E, 1F, 8B, 45, 14, 8B, CA, 49, 38, 18, 74, 08, 40, 3B, CB, 75, F6, 83, C9, FF, 8B, C2, 2B, C1, 48, 3B, C2, 7D, 01, 40, 89, 45, 18, 89, 5D, F8, 39, 5D, 24, 75, 0B, 8B, 45, 08, 8B, 00, 8B, 40, 04, 89, 45, 24, 8B, 35, B4, 02, 45, 00, 33, C0, 39, 5D, 28, 53, 53, FF, 75, 18, 0F, 95, C0, FF, 75, 14, 8D, 04, C5, 01, 00, 00, 00, 50, FF, 75, 24, FF, D6, 8B, F8, 89...
 
[+]

Entropy:
6.3993

Code size:
313 KB (320,512 bytes)

Service
Display name:
cozaghost

Type:
Win32OwnProcess


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to pd-in-f141.1e100.net  (74.125.129.141:80)

Remove cozaghost.exe - Powered by Reason Core Security