yacqq.exe

Hefei Infinity Technology Co., Ltd.

The application yacqq.exe by Hefei Infinity Technology Co. has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address server-54-192-36-121.jfk1.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Hefei Infinity Technology Co., Ltd.  (signed and verified)

MD5:
34657c47f4996cc55b6d80c753fcb447

SHA-1:
487537099807be3ecd9d18d7615d8aad9d697375

SHA-256:
7861aa36972fbdad39fad3ddd0816459021187022f094aa106a813816ee29b26

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/2/2024 11:34:59 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.ELEX (M)
17.3.15.11

File size:
147.2 KB (150,744 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\yacqq.exe

Digital Signature
Authority:
thawte, Inc.

Valid from:
1/6/2017 7:00:00 AM

Valid to:
9/8/2017 6:59:59 AM

Subject:
CN="Hefei Infinity Technology Co., Ltd.", O="Hefei Infinity Technology Co., Ltd.", L=Hefei, S=Anhui, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
7221A387E2E2D9413C322A3DD55DA62A

File PE Metadata
Compilation timestamp:
3/15/2017 8:29:21 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

Entry address:
0xE082

Entry point:
E8, 99, 58, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, D4, 47, 42, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, A8, 30, 42, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, D4, 47, 42, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01, 00, 00, F7, C6...
 
[+]

Entropy:
6.4383

Code size:
103 KB (105,472 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-36-121.jfk1.r.cloudfront.net  (54.192.36.121:80)

TCP (HTTP):
Connects to server-54-192-36-103.jfk1.r.cloudfront.net  (54.192.36.103:80)

TCP (HTTP):
Connects to server-54-192-203-53.fra50.r.cloudfront.net  (54.192.203.53:80)

TCP (HTTP):
Connects to server-54-192-203-23.fra50.r.cloudfront.net  (54.192.203.23:80)

TCP (HTTP):
Connects to server-54-192-203-190.fra50.r.cloudfront.net  (54.192.203.190:80)

TCP (HTTP):
Connects to server-54-192-203-160.fra50.r.cloudfront.net  (54.192.203.160:80)

TCP (HTTP):
Connects to server-54-230-141-247.sfo5.r.cloudfront.net  (54.230.141.247:80)

TCP (HTTP):
Connects to server-52-85-63-159.lhr50.r.cloudfront.net  (52.85.63.159:80)

TCP (HTTP):
Connects to server-52-84-246-239.sfo20.r.cloudfront.net  (52.84.246.239:80)

TCP (HTTP):
Connects to server-52-84-246-106.sfo20.r.cloudfront.net  (52.84.246.106:80)

TCP (HTTP):
Connects to server-54-239-132-184.sfo9.r.cloudfront.net  (54.239.132.184:80)

TCP (HTTP):
Connects to server-54-239-132-112.sfo9.r.cloudfront.net  (54.239.132.112:80)

TCP (HTTP):
Connects to server-54-230-95-16.fra2.r.cloudfront.net  (54.230.95.16:80)

TCP (HTTP):
Connects to server-54-230-81-65.mia50.r.cloudfront.net  (54.230.81.65:80)

TCP (HTTP):
Connects to server-54-230-81-200.mia50.r.cloudfront.net  (54.230.81.200:80)

TCP (HTTP):
Connects to server-54-230-216-60.mrs50.r.cloudfront.net  (54.230.216.60:80)

TCP (HTTP):
Connects to server-54-230-216-251.mrs50.r.cloudfront.net  (54.230.216.251:80)

TCP (HTTP):
Connects to server-54-230-216-186.mrs50.r.cloudfront.net  (54.230.216.186:80)

TCP (HTTP):
Connects to server-54-230-216-163.mrs50.r.cloudfront.net  (54.230.216.163:80)

TCP (HTTP):
Connects to server-54-230-216-157.mrs50.r.cloudfront.net  (54.230.216.157:80)

Remove yacqq.exe - Powered by Reason Core Security