nsq328e.tmp

The file nsq328e.tmp has been detected as a potentially unwanted program by 6 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from s3.amazonaws.com.
MD5:
45f78207a5d7c396436c8bf09e4b1316

SHA-1:
e3fbf9091f35040bc0ae208456720ecabc54927a

SHA-256:
c1a2749c661c850e7a087f9ec01eec69d96ce32c3dac4a42bf3c07308502639e

Scanner detections:
6 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 10:40:55 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.VOPackage
2015.09.30

Arcabit
PUP.Adware.ConvertAd
1.0.0.567

avast!
Win32:Malware-gen
2014.9-151101

Baidu Antivirus
Hacktool.NSIS.Agent
4.0.3.15111

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.1348

Panda Antivirus
Generic Suspicious
15.11.01.08

File size:
233.4 KB (238,951 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\nsq328e.tmp

File PE Metadata
Compilation timestamp:
12/6/2009 4:20:52 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:ue340f2KIy7uzsND+g1C6ij7T/9PMcoYoSQlA2oY:IKIy7aazij7TyLSQlA3Y

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.8826

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file nsq328e.tmp has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-39-232.jfk1.r.cloudfront.net  (54.230.39.232:80)

TCP (HTTP):
Connects to ec2-54-235-132-107.compute-1.amazonaws.com  (54.235.132.107:80)

TCP (HTTP):
Connects to ec2-52-1-45-42.compute-1.amazonaws.com  (52.1.45.42:80)

Remove nsq328e.tmp - Powered by Reason Core Security