yacqq.exe

Hefei Infinity Technology Co., Ltd.

The application yacqq.exe by Hefei Infinity Technology Co. has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address server-54-239-132-96.sfo9.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Hefei Infinity Technology Co., Ltd.  (signed and verified)

MD5:
c98cb8f2b1ef3c474bfa35f036049042

SHA-1:
8f3c1edd102226dcc9689732c09f290f044bf910

SHA-256:
dbeafeab7ef34a17e9f12714ffdb29f7a78fcd74bc7171b8ee2082d10716b6a2

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/18/2024 11:14:19 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.ELEX (M)
17.3.16.10

File size:
147.2 KB (150,744 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\temp\{random}.tmp\yacqq.exe

Digital Signature
Authority:
thawte, Inc.

Valid from:
1/6/2017 5:30:00 AM

Valid to:
9/8/2017 5:29:59 AM

Subject:
CN="Hefei Infinity Technology Co., Ltd.", O="Hefei Infinity Technology Co., Ltd.", L=Hefei, S=Anhui, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
7221A387E2E2D9413C322A3DD55DA62A

File PE Metadata
Compilation timestamp:
3/16/2017 7:00:07 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

Entry address:
0xE0A2

Entry point:
E8, 99, 58, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, D4, 47, 42, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, A8, 30, 42, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, D4, 47, 42, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01, 00, 00, F7, C6...
 
[+]

Entropy:
6.4385

Code size:
103 KB (105,472 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-52-85-63-5.lhr50.r.cloudfront.net  (52.85.63.5:80)

TCP (HTTP):
Connects to server-52-85-63-179.lhr50.r.cloudfront.net  (52.85.63.179:80)

TCP (HTTP):
Connects to server-54-230-81-94.mia50.r.cloudfront.net  (54.230.81.94:80)

TCP (HTTP):
Connects to server-54-230-81-161.mia50.r.cloudfront.net  (54.230.81.161:80)

TCP (HTTP):
Connects to server-52-84-246-140.sfo20.r.cloudfront.net  (52.84.246.140:80)

TCP (HTTP):
Connects to server-52-84-246-104.sfo20.r.cloudfront.net  (52.84.246.104:80)

TCP (HTTP):
Connects to server-52-85-83-233.lax1.r.cloudfront.net  (52.85.83.233:80)

TCP (HTTP):
Connects to server-54-230-0-185.lhr5.r.cloudfront.net  (54.230.0.185:80)

TCP (HTTP):
Connects to server-54-239-132-225.sfo9.r.cloudfront.net  (54.239.132.225:80)

TCP (HTTP):
Connects to server-54-230-81-205.mia50.r.cloudfront.net  (54.230.81.205:80)

TCP (HTTP):
Connects to server-54-230-81-200.mia50.r.cloudfront.net  (54.230.81.200:80)

TCP (HTTP):
Connects to server-54-230-216-10.mrs50.r.cloudfront.net  (54.230.216.10:80)

TCP (HTTP):
Connects to server-54-230-141-113.sfo5.r.cloudfront.net  (54.230.141.113:80)

TCP (HTTP):
Connects to server-54-230-0-88.lhr5.r.cloudfront.net  (54.230.0.88:80)

TCP (HTTP):
Connects to server-54-192-203-81.fra50.r.cloudfront.net  (54.192.203.81:80)

TCP (HTTP):
Connects to server-52-85-77-23.lax3.r.cloudfront.net  (52.85.77.23:80)

TCP (HTTP):
Connects to server-54-230-95-154.fra2.r.cloudfront.net  (54.230.95.154:80)

TCP (HTTP):
Connects to server-54-230-81-90.mia50.r.cloudfront.net  (54.230.81.90:80)

TCP (HTTP):
Connects to server-54-230-81-89.mia50.r.cloudfront.net  (54.230.81.89:80)

TCP (HTTP):
Connects to server-54-230-81-231.mia50.r.cloudfront.net  (54.230.81.231:80)

Remove yacqq.exe - Powered by Reason Core Security