nsw13.exe

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application nsw13.exe by ClientConnect has been detected as adware by 10 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from 113.171.224.213 and multiple other hosts.
Publisher:
Client Connect  (signed by ClientConnect LTD)

Description:
Search Protect

Version:
2.4.3.3

MD5:
ae9dc93c1788422a2affa1f804f498a6

SHA-1:
7028f239fac673ee7dc7772acc75d759ea73837d

SHA-256:
0b72985e7fd1990e804bc4a395692ba2b653b9925a4a2bd8157760819402037f

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
12/24/2024 2:21:12 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3371

Baidu Antivirus
PUA.Win32.ClientConnect
4.0.3.14826

Dr.Web
Adware.Conduit.101
9.0.1.0238

ESET NOD32
Win32/ClientConnect (variant)
8.10317

IKARUS anti.virus
PUA.ClientConnect
t3scan.1.7.5.0

Malwarebytes
PUP.Optional.Conduit.A
v2014.08.26.11

Qihoo 360 Security
HEUR/Malware.QVM06.Gen
1.0.0.1015

Reason Heuristics
PUP.ClientConnect.F
14.8.26.11

Sophos
SearchProtect
4.98

VIPRE Antivirus
Conduit
32560

File size:
173.3 KB (177,432 bytes)

Copyright:
© 2014 Client Connect Ltd.

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\nsw13.exe

Digital Signature
Authority:
Symantec Corporation

Valid from:
4/28/2014 5:00:00 PM

Valid to:
4/29/2016 4:59:59 PM

Subject:
CN=ClientConnect LTD, OU=SPStub, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
36AC210D3412C8646EB3F4C8EE541402

File PE Metadata
Compilation timestamp:
7/6/2011 7:31:20 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:acmVWD5ltbmP3Q7ywC8lRfc09TXS5kMPe1PEhTQzVbwR7Q3p3w1zb+qvDmVyFDgY:RmJIk8nc0xXskMYEZQzVZws+aQDlV

Entry address:
0x354B

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 84, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, B0, 82, 40, 00, 6A, 08, A3, 98, 06, 47, 00, E8, 67, 27, 00, 00, 55, 68, B4, 02, 00, 00, A3, B0, 05, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 86, 40, 00, FF, 15, 80, 81, 40, 00, 68, 04, 86, 40, 00, 68, A0, 85, 46, 00, E8, 35, 26, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 10, 4C, 00, 57, E8, 23, 26, 00, 00...
 
[+]

Entropy:
7.8297

Packer / compiler:
Nullsoft install system v2.x

Code size:
25 KB (25,600 bytes)

The file nsw13.exe has been seen being distributed by the following 6 URLs.

http://113.171.224.213/.../spstub.exe

http://113.171.224.214/.../Stub.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-243-172-57.compute-1.amazonaws.com  (54.243.172.57:80)

TCP (HTTP):
Connects to ec2-54-235-181-209.compute-1.amazonaws.com  (54.235.181.209:80)

TCP (HTTP):
Connects to ec2-23-21-214-196.compute-1.amazonaws.com  (23.21.214.196:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-218-89-215.deploy.static.akamaitechnologies.com  (23.218.89.215:80)

TCP (HTTP):

TCP (HTTP):
Connects to a184-29-98-207.deploy.static.akamaitechnologies.com  (184.29.98.207:80)

Remove nsw13.exe - Powered by Reason Core Security