luxor super pack (9 games in 1) 2014 [final] foxy games.exe

The application luxor super pack (9 games in 1) 2014 [final] foxy games.exe has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a scheduled task under the Windows Task Scheduler triggered daily at a specified time. The file has been seen being downloaded from a.all-matrix.ru.
MD5:
552d64abc5f872dc3f26f0e6c85dcae3

SHA-1:
65a867a84076692bd361f5998ff5703aadf67a3a

SHA-256:
646ad21f8c2d6f6af707e2d87c5e69f7093da8f1a66c5141015400c43e6034cb

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/16/2024 10:41:31 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Optional.PCUtilities (M)
16.2.17.5

File size:
191.5 KB (196,096 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\ProgramData\{7bf8e9b6-9bac-5716-7bf8-8e9b69baa6da}\luxor super pack (9 games in 1) 2014 [final] foxy games.exe

File PE Metadata
Compilation timestamp:
3/4/2012 11:10:52 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:LLy/+Gg0UcsI/CpAH+b04hwd7aiVPVAMOT5M2Gw2Jso1yxcw:LLKre/pNcd7a8OTnZxcw

Entry address:
0x677B

Entry point:
E8, 0D, 12, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 70, 60, 42, 00, E8, 1F, 17, 00, 00, E8, DA, 13, 00, 00, 0F, B7, F0, 6A, 02, E8, A0, 11, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, D3, 06, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.9124

Code size:
46 KB (47,104 bytes)

Scheduled Task
Task name:
Bidaily Synchronize Task[973b]

Trigger:
Daily (Runs daily at 18:21)


The file luxor super pack (9 games in 1) 2014 [final] foxy games.exe has been seen being distributed by the following URL.