ic-0.300d73ce755a9.exe

Yuanyuan Mei

The application ic-0.300d73ce755a9.exe by Yuanyuan Mei has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address server-54-239-132-116.sfo9.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Yuanyuan Mei  (signed and verified)

MD5:
0224817a05ab5478c233b233d30e5622

SHA-1:
c10695e3be4ef19cc090de195078237be6087cb5

SHA-256:
2c150cb2bdde91c4c77ac04218743318cdea18ceca4c78d0823916de31996c8c

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/27/2024 4:45:16 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Elex (M)
17.2.25.21

File size:
415.4 KB (425,408 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\ic-0.300d73ce755a9.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
1/17/2017 3:00:00 AM

Valid to:
4/21/2017 2:59:59 AM

Subject:
CN=Yuanyuan Mei, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
42CDD87CEEA3C88A57939591CB1B6DE8

File PE Metadata
Compilation timestamp:
2/13/2017 6:43:28 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x64BF

Entry point:
E8, 4F, 23, 00, 00, E9, 74, 4D, 00, 00, 6A, 08, 68, F0, 40, 46, 00, E8, FB, 59, 00, 00, 8B, 7D, 08, 8B, C7, C1, F8, 05, 8B, F7, 83, E6, 1F, C1, E6, 06, 03, 34, 85, 38, 6D, 46, 00, 33, DB, 39, 5E, 08, 75, 31, 6A, 0A, E8, 67, 19, 00, 00, 59, 89, 5D, FC, 39, 5E, 08, 75, 15, 53, 68, A0, 0F, 00, 00, 8D, 46, 0C, 50, E8, 53, 18, 00, 00, 83, C4, 0C, FF, 46, 08, C7, 45, FC, FE, FF, FF, FF, E8, 2A, 00, 00, 00, 8B, C7, C1, F8, 05, 83, E7, 1F, C1, E7, 06, 8B, 04, 85, 38, 6D, 46, 00, 83, C0, 0C, 03, C7, 50, FF, 15, CC...
 
[+]

Entropy:
7.8319  (probably packed)

Code size:
373.5 KB (382,464 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-239-132-104.sfo9.r.cloudfront.net  (54.239.132.104:80)

TCP (HTTP):
Connects to server-54-230-141-131.sfo5.r.cloudfront.net  (54.230.141.131:80)

TCP (HTTP):
Connects to server-54-239-132-64.sfo9.r.cloudfront.net  (54.239.132.64:80)

TCP (HTTP):
Connects to server-54-239-132-131.sfo9.r.cloudfront.net  (54.239.132.131:80)

TCP (HTTP):
Connects to server-54-230-216-49.mrs50.r.cloudfront.net  (54.230.216.49:80)

TCP (HTTP):
Connects to server-54-230-141-171.sfo5.r.cloudfront.net  (54.230.141.171:80)

TCP (HTTP):
Connects to server-54-230-216-106.mrs50.r.cloudfront.net  (54.230.216.106:80)

TCP (HTTP):
Connects to server-54-192-19-140.iad12.r.cloudfront.net  (54.192.19.140:80)

TCP (HTTP):
Connects to server-54-239-132-45.sfo9.r.cloudfront.net  (54.239.132.45:80)

TCP (HTTP):
Connects to server-54-239-132-254.sfo9.r.cloudfront.net  (54.239.132.254:80)

TCP (HTTP):
Connects to server-54-230-81-244.mia50.r.cloudfront.net  (54.230.81.244:80)

TCP (HTTP):
Connects to server-54-230-216-13.mrs50.r.cloudfront.net  (54.230.216.13:80)

TCP (HTTP):
Connects to server-52-85-63-112.lhr50.r.cloudfront.net  (52.85.63.112:80)

TCP (HTTP):
Connects to server-54-230-141-50.sfo5.r.cloudfront.net  (54.230.141.50:80)

TCP (HTTP):
Connects to server-54-239-132-141.sfo9.r.cloudfront.net  (54.239.132.141:80)

TCP (HTTP):
Connects to server-54-239-132-116.sfo9.r.cloudfront.net  (54.239.132.116:80)

TCP (HTTP):
Connects to server-54-230-163-227.jax1.r.cloudfront.net  (54.230.163.227:80)

TCP (HTTP):
Connects to server-54-230-141-143.sfo5.r.cloudfront.net  (54.230.141.143:80)

TCP (HTTP):
Connects to server-54-230-141-17.sfo5.r.cloudfront.net  (54.230.141.17:80)

TCP (HTTP):
Connects to server-54-192-203-34.fra50.r.cloudfront.net  (54.192.203.34:80)

Remove ic-0.300d73ce755a9.exe - Powered by Reason Core Security