nsk4e02.tmp

The file nsk4e02.tmp has been detected as a potentially unwanted program by 4 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from s3.amazonaws.com. While running, it connects to the Internet address server-204-246-169-59.jfk1.r.cloudfront.net on port 80 using the HTTP protocol.
MD5:
3e1970bf5d419cb5aed72edb114953c6

SHA-1:
54351ef8ad055bf4e52e5197af257016ec810428

SHA-256:
673e97e6c767796cbd1621f575d341477de647e6e5d2d2da8f59bd81bb1691bf

Scanner detections:
4 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 2:13:51 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.VOPackage
2015.09.28

Arcabit
PUP.Adware.ConvertAd
1.0.0.567

Kaspersky
not-a-virus:AdWare.Win32.Vopak
14.0.0.1197

Reason Heuristics
Adware.Generic.ABT (M)
16.2.29.17

File size:
225.7 KB (231,157 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\nsk4e02.tmp

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:GgXdZt9P6D3XJBlvX2sL4lSib63jtYBm7mpKOAptrAOR3XzFTCZqJ3W9CgqtimU3:Ge34hGsL4466zj7mpkvnjTCZUTtQHv

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file nsk4e02.tmp has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-204-246-169-59.jfk1.r.cloudfront.net  (204.246.169.59:80)

TCP (HTTP):
Connects to ec2-52-1-45-42.compute-1.amazonaws.com  (52.1.45.42:80)

Remove nsk4e02.tmp - Powered by Reason Core Security