jnsd65c8.tmp

The file jnsd65c8.tmp has been detected as malware by 10 anti-virus scanners. It runs as a separate (within the context of its own process) windows Service named “Data Spelling”. The file has been seen being downloaded from 113.171.224.167 and multiple other hosts.
MD5:
93cfef7548f083e4275b43c837c80879

SHA-1:
0c39bbbc763b1c20d85a4096d944435e4968ac82

SHA-256:
46d3b56fd96bb2c73973235418f14ffb70a608976c51def15e48dbc7ff3f67e3

Scanner detections:
10 / 68

Status:
Malware

Analysis date:
11/27/2024 8:59:33 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2292339
5675496

Bitdefender
Trojan.GenericKD.2292339
1.0.20.520

Emsisoft Anti-Malware
Trojan.GenericKD.2292339
9.0.0.4799

F-Secure
Trojan.GenericKD.2292339
5.13.68

G Data
Trojan.GenericKD.2292339
15.4.25

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.2194

McAfee
Trojan.Artemis!93CFEF7548F0
16.8.708.2

MicroWorld eScan
Trojan.GenericKD.2292339
16.0.0.312

nProtect
Trojan.GenericKD.2292339
15.04.13.01

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

File size:
132.5 KB (135,680 bytes)

Common path:
C:\users\{user}\appdata\roaming\8ab8715c-1428856774-11e0-a851-46345429cc61\jnsd65c8.tmp

File PE Metadata
Compilation timestamp:
4/12/2015 7:22:10 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:LyroAdGIJttt0m2L20F7OhX+kpz7Vka2i3Go62p:lAd3Jtttm20pOB+MXVPMo62p

Entry address:
0xE415

Entry point:
E8, CA, 48, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 55, 08, 56, 57, 85, D2, 74, 07, 8B, 7D, 0C, 85, FF, 75, 13, E8, 6B, 2F, 00, 00, 6A, 16, 5E, 89, 30, E8, 0F, 2F, 00, 00, 8B, C6, EB, 33, 8B, 45, 10, 85, C0, 75, 04, 88, 02, EB, E2, 8B, F2, 2B, F0, 8A, 08, 88, 0C, 06, 40, 84, C9, 74, 03, 4F, 75, F3, 85, FF, 75, 11, C6, 02, 00, E8, 35, 2F, 00, 00, 6A, 22, 59, 89, 08, 8B, F1, EB, C6, 33, C0, 5F, 5E, 5D, C3, 8B, FF, 55, 8B, EC, 53, 8B, 5D, 08, 83, FB, E0, 77, 6F, 56, 57, 83, 3D, CC, 19, 42, 00, 00...
 
[+]

Entropy:
6.3220

Code size:
92.5 KB (94,720 bytes)

Service
Display name:
Data Spelling

Service name:
zywijuly

Description:
Flat Panel Monitor Back

Type:
Win32OwnProcess


The file jnsd65c8.tmp has been seen being distributed by the following 2 URLs.

http://113.171.224.167/.../JOSrv.exe

Remove jnsd65c8.tmp - Powered by Reason Core Security