nswb47c.tmp

The file nswb47c.tmp has been detected as a potentially unwanted program by 4 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from s3.amazonaws.com. While running, it connects to the Internet address server-54-192-55-67.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
MD5:
fd5d53411e4f0a19c072447ffa2fb1e8

SHA-1:
7ff8d7902864b9387a52ca6f417460ee5dae86da

SHA-256:
228b3f3cb3d091ca42cb17ad75f94cdb240355c01b993864e46db4e02ae93d78

Scanner detections:
4 / 68

Status:
Potentially unwanted

Analysis date:
11/16/2024 3:22:02 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.VOPackage
2015.12.04

Arcabit
PUP.Adware.ConvertAd
1.0.0.628

Qihoo 360 Security
QVM42.0.Malware.Gen
1.0.0.1077

Reason Heuristics
Adware.Generic.ABT (M)
16.2.29.18

File size:
240.8 KB (246,624 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\nswb47c.tmp

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:se34kzDzU7ChPDWGN3MPYdQp7tHAv9wGoprY:BUm1hN3hdQFY9wGUrY

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file nswb47c.tmp has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-53-9.jfk6.r.cloudfront.net  (54.230.53.9:80)

TCP (HTTP):
Connects to server-54-230-52-89.jfk6.r.cloudfront.net  (54.230.52.89:80)

TCP (HTTP):
Connects to server-54-192-55-67.jfk6.r.cloudfront.net  (54.192.55.67:80)

TCP (HTTP):
Connects to ec2-54-225-164-100.compute-1.amazonaws.com  (54.225.164.100:80)

TCP (HTTP):
Connects to ec2-52-1-45-42.compute-1.amazonaws.com  (52.1.45.42:80)

TCP (HTTP):
Connects to ec2-107-22-235-143.compute-1.amazonaws.com  (107.22.235.143:80)

TCP (HTTP):
Connects to dl21.clickmein.com  (216.227.128.186:80)

Remove nswb47c.tmp - Powered by Reason Core Security