jjcscheduleservice.exe

Ding Ruan

The application jjcscheduleservice.exe by Ding Ruan has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address server-52-84-33-218.ewr50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Ding Ruan  (signed and verified)

MD5:
d36bfb234305c3e6a4b7bf75d993d812

SHA-1:
0b76a4b07f26b3f6253bbe19ff758246267edb7a

SHA-256:
66b1fa848355077ab0abcd50987bbc63adc02d330304f53db842347d35bf1723

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 12:22:00 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.YesSearches (M)
16.4.21.18

File size:
303.5 KB (310,768 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\jejochclipasp\jjcscheduleservice.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
4/13/2016 7:00:00 AM

Valid to:
4/14/2017 6:59:59 AM

Subject:
CN=Ding Ruan, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
5A95293A2DA9C3BA3F8B18EFA882A3FF

File PE Metadata
Compilation timestamp:
4/12/2016 9:11:10 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:jMe1YQyw8TsyYKrzxX8cFoX9tqfdNQFmH:jx1elg5KrNveXGfdNQFM

Entry address:
0x1E0D0

Entry point:
E8, 81, 57, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, 0C, 91, 44, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 70, 74, 44, 00, 01, 0F, 82, 9B, 5C, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83, E2, 03...
 
[+]

Entropy:
6.4967

Code size:
222.5 KB (227,840 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-163-249.jax1.r.cloudfront.net  (54.230.163.249:80)

TCP (HTTP):
Connects to server-54-192-37-169.jfk1.r.cloudfront.net  (54.192.37.169:80)

TCP (HTTP):
Connects to server-52-84-246-232.sfo20.r.cloudfront.net  (52.84.246.232:80)

TCP (HTTP):
Connects to server-54-230-81-87.mia50.r.cloudfront.net  (54.230.81.87:80)

TCP (HTTP):
Connects to server-54-230-81-25.mia50.r.cloudfront.net  (54.230.81.25:80)

TCP (HTTP):
Connects to server-54-230-81-217.mia50.r.cloudfront.net  (54.230.81.217:80)

TCP (HTTP):
Connects to server-54-230-81-211.mia50.r.cloudfront.net  (54.230.81.211:80)

TCP (HTTP):
Connects to server-54-230-81-208.mia50.r.cloudfront.net  (54.230.81.208:80)

TCP (HTTP):
Connects to server-54-230-81-159.mia50.r.cloudfront.net  (54.230.81.159:80)

TCP (HTTP):
Connects to server-54-230-206-79.atl50.r.cloudfront.net  (54.230.206.79:80)

TCP (HTTP):
Connects to server-54-230-206-250.atl50.r.cloudfront.net  (54.230.206.250:80)

TCP (HTTP):
Connects to server-54-230-163-97.jax1.r.cloudfront.net  (54.230.163.97:80)

TCP (HTTP):
Connects to server-54-230-163-87.jax1.r.cloudfront.net  (54.230.163.87:80)

TCP (HTTP):
Connects to server-54-230-163-44.jax1.r.cloudfront.net  (54.230.163.44:80)

TCP (HTTP):
Connects to server-54-230-163-233.jax1.r.cloudfront.net  (54.230.163.233:80)

TCP (HTTP):
Connects to server-54-230-163-225.jax1.r.cloudfront.net  (54.230.163.225:80)

TCP (HTTP):
Connects to server-54-230-163-128.jax1.r.cloudfront.net  (54.230.163.128:80)

TCP (HTTP):
Connects to server-54-230-141-174.sfo5.r.cloudfront.net  (54.230.141.174:80)

TCP (HTTP):
Connects to server-54-192-37-6.jfk1.r.cloudfront.net  (54.192.37.6:80)

TCP (HTTP):
Connects to server-54-192-37-225.jfk1.r.cloudfront.net  (54.192.37.225:80)

Remove jjcscheduleservice.exe - Powered by Reason Core Security