CCProxy.EXE

CCProxy

Youngzsoft Co., Ltd.

The application CCProxy.EXE by Youngzsoft Co. has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “CCProxy”. While running, it connects to the Internet address li365-173.members.linode.com on port 80 using the HTTP protocol.
Publisher:
Youngzsoft  (signed by Youngzsoft Co., Ltd.)

Product:
CCProxy

Version:
8, 0, 0, 0

MD5:
bfed7390638d631a3cb96cc3bd2fae99

SHA-1:
e6b1c438de41a329b15abf97d1a0c61a032c23cb

SHA-256:
76cac0870735f535e531de829b710c54ebc0a77e59984f7567aafec190d64c60

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
5/1/2024 10:44:53 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Service.YoungzsoftCo.H
14.10.7.15

File size:
2.7 MB (2,875,800 bytes)

Product version:
8, 0, 0, 0

Copyright:
(c) Youngzsoft. All rights reserved.

Original file name:
CCProxy.EXE

File type:
Executable application (Win64 EXE)

Language:
English (United States)

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/16/2014 7:00:00 PM

Valid to:
4/17/2015 6:59:59 PM

Subject:
CN="Youngzsoft Co., Ltd.", OU=Software Development, OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Youngzsoft Co., Ltd.", L=Changsha, S=Hunan, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3100D378FD898D4DA76C9FCBA2E349F7

File PE Metadata
Compilation timestamp:
8/29/2014 10:08:29 PM

OS version:
5.2

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
49152:TWVbNh4MA1Y5gSpJEAAQlPr5D5Mo8ttUKOyyA0NE:kbMMb5gwr9U1SA0NE

Entry address:
0x11A508

Entry point:
48, 83, EC, 28, E8, 17, BE, 00, 00, 48, 83, C4, 28, E9, 16, FE, FF, FF, CC, CC, 48, 89, 5C, 24, 10, 48, 89, 6C, 24, 18, 48, 89, 74, 24, 20, 57, 41, 54, 41, 55, 41, 56, 41, 57, 48, 83, EC, 20, 49, 63, 78, 0C, 4C, 8B, F9, 49, 8B, C8, 49, 8B, E9, 4D, 8B, E8, 4C, 8B, F2, E8, 18, BF, 00, 00, 4D, 8B, 17, 4C, 89, 55, 00, 44, 8B, E0, 85, FF, 0F, 84, 85, 00, 00, 00, 48, 8D, 0C, BF, 48, 8D, 34, 8D, EC, FF, FF, FF, 49, 63, 5D, 10, 49, 03, 5E, 08, 48, 03, DE, 44, 3B, 63, 04, 7E, 49, 44, 3B, 63, 08, 7F, 43, 49, 8B, 0E...
 
[+]

Entropy:
6.3260

Code size:
1.4 MB (1,503,232 bytes)

Service
Display name:
CCProxy

Type:
Win32OwnProcess


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to li365-173.members.linode.com  (96.126.108.173:80)

Remove CCProxy.EXE - Powered by Reason Core Security