nsh1770.tmp

The file nsh1770.tmp has been detected as a potentially unwanted program by 12 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from livestatscounter.com. While running, it connects to the Internet address server-205-251-251-79.jfk5.r.cloudfront.net on port 80 using the HTTP protocol.
MD5:
acfb4ed60d6250969097a7b0cb323870

SHA-1:
efd157e32aee225399d9f4e9bd8aa3d792d6eceb

SHA-256:
451932df7a80f1f2a954c302e4097142a3c60ae9a6e604980e57949bf99c7ccf

Scanner detections:
12 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 6:33:51 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.ConvertAd
2016.01.03

Baidu Antivirus
Adware.Win32.ConvertAd
4.0.3.1613

Dr.Web
Adware.ClickMeIn.4706
9.0.1.03

ESET NOD32
Win32/Adware.ConvertAd.ADW (variant)
10.12804

Malwarebytes
PUP.Optional.ConvertAd
v2016.01.03.12

McAfee
Artemis!ACFB4ED60D62
5600.6531

NANO AntiVirus
Riskware.Win32.ClickMeIn.dzfudt
1.0.14.5380

Qihoo 360 Security
HEUR/QVM42.0.Malware.Gen
1.0.0.1077

Rising Antivirus
PE:Malware.Generic/QRS!1.9E2D [F]
23.00.65.16101

Sophos
Generic PUA OP (PUA)
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-FakeDefender
9484

VIPRE Antivirus
Trojan.Win32.Generic
46230

File size:
116.9 KB (119,687 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\nsh1770.tmp

File PE Metadata
Compilation timestamp:
12/6/2009 12:50:52 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:MgXdZt9P6D3XJwMkWFM4BUjLBfNYVlAfqNKOebvvkemYk:Me34TxCjF2Em

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.7580

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file nsh1770.tmp has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-205-251-251-79.jfk5.r.cloudfront.net  (205.251.251.79:80)

TCP (HTTP):
Connects to ec2-54-225-164-100.compute-1.amazonaws.com  (54.225.164.100:80)

TCP (HTTP SSL):
Connects to ec2-54-209-124-251.compute-1.amazonaws.com  (54.209.124.251:443)

TCP (HTTP):
Connects to ec2-52-1-45-42.compute-1.amazonaws.com  (52.1.45.42:80)

TCP (HTTP):
Connects to c-0001.c-msedge.net  (191.234.4.50:80)

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

Remove nsh1770.tmp - Powered by Reason Core Security