nsjef15.tmp

4575_cmi_mystartsearch

Fuyuan Zhou

The file nsjef15.tmp by Fuyuan Zhou has been detected as adware by 12 anti-malware scanners. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from d2drfrdurj6mvo.cloudfront.net.
Publisher:
7th  (signed by Fuyuan Zhou)

Product:
4575_cmi_mystartsearch

Description:
7th

Version:
7,0,0,2749

MD5:
94c92894119d1b7569d1b35651d5dbd6

SHA-1:
46d7f8610f803b3af2f01c20a54fc7abfe7ddb97

SHA-256:
cd9e21a8c6676b6453bb7312c2afc229babf7999e1b667a07f7bb47b84d1b7bc

Scanner detections:
12 / 68

Status:
Adware

Analysis date:
11/1/2024 7:17:28 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Kazy.713134
531

Arcabit
Trojan.Kazy.DAE1AE
1.0.0.425

Bitdefender
Gen:Variant.Kazy.713134
1.0.20.1175

Bkav FE
W32.HfsAdware
1.3.0.7133

Dr.Web
Adware.Mutabaha.597
9.0.1.0235

Emsisoft Anti-Malware
Gen:Variant.Kazy.713134
8.15.08.23.07

F-Secure
Gen:Variant.Kazy.713134
11.2015-23-08_1

G Data
Gen:Variant.Kazy.713134
15.8.25

Malwarebytes
PUP.Optional.MyStartSearch.ShrtCln
v2015.08.23.07

MicroWorld eScan
Gen:Variant.Kazy.713134
16.0.0.705

NANO AntiVirus
Riskware.Win32.Mutabaha.dvglla
0.30.24.3079

Reason Heuristics
PUP.FuyuanZhou (M)
15.8.23.7

File size:
310.6 KB (318,048 bytes)

Product version:
7,0,0,2749

Copyright:
7th

Original file name:
7th

Language:
English (United Kingdom)

Common path:
C:\users\{user}\appdata\local\temp\nsjef15.tmp

Digital Signature
Signed by:

Authority:
DigiCert Inc

Valid from:
1/15/2015 4:00:00 AM

Valid to:
1/20/2016 4:00:00 PM

Subject:
CN=Fuyuan Zhou, O=Fuyuan Zhou, L=Jilin, S=Jilin, C=CN

Issuer:
CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
0933772030CFD7E6A3D0D1959D875688

File PE Metadata
Compilation timestamp:
8/17/2015 5:34:32 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:WUPXCS0kqwgcZ4PKcvCncznqLXwOa+f5Spbu+1Tcz+CaY3d7TxJvgdX:WMXCS6bG3CblTczdoh

Entry address:
0x232D4

Entry point:
E8, 5E, CF, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 20, 76, 44, 00, E8, 56, 67, 00, 00, E8, 82, 2D, 00, 00, 0F, B7, F0, 6A, 02, E8, F1, CE, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, B2, 63, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.3057

Code size:
235 KB (240,640 bytes)

The file nsjef15.tmp has been seen being distributed by the following URL.

Remove nsjef15.tmp - Powered by Reason Core Security