cjsz700-p700en.exe

Lexmark International, Inc.

The program is a setup application that uses the WinZip SFX installer. The file has been seen being downloaded from www.lexmarkdrivers.net and multiple other hosts.
Publisher:
Lexmark International, Inc.  (signed and verified)

MD5:
4ca3d35548b501b4f693a36f3b4d28ec

SHA-1:
c97af22fcf785b2c41ee40f38a6b153a1e7e0163

SHA-256:
bcb68ac7393f69cb148c3c30d6b87cd05a52f2c245e4d67297136cf59cb4f5d9

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/16/2024 6:57:45 PM UTC  (today)

File size:
58.3 MB (61,099,952 bytes)

File type:
Executable application (Win32 EXE)

Installer:
WinZip SFX

Common path:
C:\users\{user}\downloads\cjsz700-p700en.exe

Digital Signature
Authority:
Thawte Consulting (Pty) Ltd.

Valid from:
8/4/2005 3:28:51 PM

Valid to:
8/4/2007 3:28:51 PM

Subject:
CN="Lexmark International, Inc.", OU=PS&SD Business Software & Solutions, O="Lexmark International, Inc.", L=Lexington, S=Kentucky, C=US

Issuer:
CN=Thawte Code Signing CA, O=Thawte Consulting (Pty) Ltd., C=ZA

Serial number:
3FB8F5

File PE Metadata
Compilation timestamp:
1/9/2001 9:08:41 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
5.10

CTPH (ssdeep):
1572864:QQpYDXGUbeXOY3pQ7iUBnV9ismctBmNB4dcaT29O/BiFQW:QQpUXdbeeR97ismgBmKc2HW

Entry address:
0x39D8

Entry point:
53, FF, 15, 50, 60, 40, 00, B3, 22, 38, 18, 74, 03, 80, C3, FE, 8A, 48, 01, 40, 33, D2, 3A, CA, 74, 0A, 3A, CB, 74, 06, 8A, 48, 01, 40, EB, F2, 38, 10, 74, 01, 40, 52, 50, 52, 52, FF, 15, 54, 60, 40, 00, 50, E8, 07, F8, FF, FF, 50, FF, 15, 58, 60, 40, 00, 5B, C3, 8B, 44, 24, 04, 8B, 40, 3C, 05, F8, 00, 00, 00, C3, 55, 8B, EC, 51, A1, 28, 84, 40, 00, 83, 0D, A0, 82, 40, 00, FF, 56, 33, F6, 39, 35, F8, 7D, 40, 00, 89, 35, D4, 83, 40, 00, 89, 35, 24, 84, 40, 00, A3, C4, 86, 40, 00, 75, 05, E8, 67, D8, FF, FF...
 
[+]

Entropy:
7.9978

Packer / compiler:
WinZip, 0x32-bit SFX v8.x module

Code size:
18.5 KB (18,944 bytes)

The file cjsz700-p700en.exe has been seen being distributed by the following 2 URLs.