nsw37d9.tmp

The file nsw37d9.tmp has been detected as a potentially unwanted program by 33 anti-malware scanners. The file has been seen being downloaded from d24u51ac8ybaqu.cloudfront.net. While running, it connects to the Internet address server-54-230-52-160.jfk6.r.cloudfront.net on port 443.
MD5:
2218ed01c183a395f28b69f1794100c2

SHA-1:
9b25fe6cf8f35d6f2874d17985d085baa300f22c

SHA-256:
20c355c939213039a80b05a41f3c2413f1eb2f0def88d1ba1243c57616a0a582

Scanner detections:
33 / 68

Status:
Potentially unwanted

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
12/26/2024 5:15:54 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Mikey.28503
397

Agnitum Outpost
Trojan.DL.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.CrossRider
2015.11.26

Avira AntiVirus
TR/Taranis.399
8.3.2.4

Arcabit
Trojan.Mikey.D6F57
1.0.0.637

avast!
Win32:PUP-gen [PUP]
2014.9-160103

AVG
Generic37
2017.0.2875

Baidu Antivirus
Trojan.Win32.Downloader
4.0.3.1613

Bitdefender
Gen:Variant.Mikey.28503
1.0.20.15

Comodo Security
Application.Win32.CrossRider.AMB
23880

Emsisoft Anti-Malware
Gen:Variant.Mikey.28503
8.16.01.03.10

ESET NOD32
Win32/TrojanDownloader.Phabeload (variant)
10.12795

Fortinet FortiGate
W32/Agent.WTAIO!tr.dldr
1/3/2016

F-Prot
W32/S-dedbc734
v6.4.7.1.166

F-Secure
Gen:Variant.Mikey.28503
11.2016-03-01_1

G Data
Gen:Variant.Mikey.28503
16.1.25

IKARUS anti.virus
Trojan-Downloader.Win32.Agent
t3scan.1.9.5.0

K7 AntiVirus
Riskware
13.212.18265

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.1062

Malwarebytes
Trojan.Agent
v2016.01.03.10

McAfee
RDN/Generic Downloader.x
5600.6531

Microsoft Security Essentials
TrojanDownloader:Win32/Phabeload.A
1.1.12400.0

MicroWorld eScan
Gen:Variant.Mikey.28503
17.0.0.9

NANO AntiVirus
Trojan.Win32.Agent.dzdkhw
1.0.14.5380

Panda Antivirus
Trj/Genetic.gen
15.11.26.02

Qihoo 360 Security
HEUR/QVM08.0.Malware.Gen
1.0.0.1077

Rising Antivirus
PE:Malware.Generic/QRS!1.9E2D [F]
23.00.65.16101

Sophos
Mal/Generic-S
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Downloader
9407

Trend Micro
TROJ_GEN.R0C1C0EKU15
10.465.03

Vba32 AntiVirus
TrojanDownloader.Agent
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
46134

Zillya! Antivirus
Adware.Eorezo.Win32.19607
2.0.0.2584

File size:
10 KB (10,240 bytes)

Common path:
C:\users\{user}\appdata\local\temp\nsw37d9.tmp

File PE Metadata
Compilation timestamp:
11/26/2015 6:37:08 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
192:WuLjoGoS3sZ0I7PXGU5cIhHCDawhrFQwM5R6AJiE:LjoG73sj6hiyAJ

Entry address:
0x1000

Entry point:
6A, 70, 68, 38, 23, 40, 00, E8, F8, 01, 00, 00, 33, DB, 89, 5D, FC, 8D, 45, 80, 50, FF, 15, 00, 20, 40, 00, 83, CF, FF, 89, 7D, FC, 66, 81, 3D, 00, 00, 40, 00, 4D, 5A, 75, 28, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, 17, 0F, B7, 88, 18, 00, 40, 00, 81, F9, 0B, 01, 00, 00, 74, 20, 81, F9, 0B, 02, 00, 00, 74, 05, 89, 5D, E4, EB, 2A, 83, B8, 84, 00, 40, 00, 0E, 76, F2, 33, C9, 39, 98, F8, 00, 40, 00, EB, 11, 83, B8, 74, 00, 40, 00, 0E, 76, DF, 33, C9, 39, 98, E8, 00, 40, 00, 0F, 95, C1...
 
[+]

Entropy:
4.9136

Developed / compiled with:
Microsoft Visual C++ v7.1

Code size:
3 KB (3,072 bytes)

The file nsw37d9.tmp has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to server-54-230-52-160.jfk6.r.cloudfront.net  (54.230.52.160:443)

TCP (HTTP SSL):
Connects to server-205-251-251-72.jfk5.r.cloudfront.net  (205.251.251.72:443)

TCP (HTTP SSL):
Connects to server-205-251-251-66.jfk5.r.cloudfront.net  (205.251.251.66:443)

TCP (HTTP SSL):
Connects to server-205-251-251-253.jfk5.r.cloudfront.net  (205.251.251.253:443)

TCP (HTTP SSL):
Connects to server-205-251-251-193.jfk5.r.cloudfront.net  (205.251.251.193:443)

TCP (HTTP SSL):
Connects to server-205-251-251-189.jfk5.r.cloudfront.net  (205.251.251.189:443)

TCP (HTTP SSL):
Connects to server-205-251-251-14.jfk5.r.cloudfront.net  (205.251.251.14:443)

Remove nsw37d9.tmp - Powered by Reason Core Security