| URL: | http://down.shusw.com/jpwb/gf/setup_jpxz001.exe |
| Full analysis: | https://app.any.run/tasks/81e4a49b-44d1-451f-9f87-8cccddc5a230 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | December 19, 2019, 02:51:13 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 40D5CD2479192ACD764DB933123FD6A9 |
| SHA1: | C9A28E79E11EF0D7CD7DD541B3A4CF33050654AF |
| SHA256: | 2691F81EF6346ED360B6F2DF36F7DF564B9F4E202707D3F4C2F3803BAE2DD361 |
| SSDEEP: | 3:N1KaKBNQWSLKKgH0RfHVVS4An:Ca04KTURN0Nn |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 292 | "C:\Program Files\JiPinInput\2.2.1.1111\JPWizard.exe" | C:\Program Files\JiPinInput\2.2.1.1111\JPWizard.exe | setup_jpxz001.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: 输入法设置向导 Exit code: 0 Version: 2,2,1,11201 Modules
| |||||||||||||||
| 532 | "C:\Program Files\Internet Explorer\iexplore.exe" "http://down.shusw.com/jpwb/gf/setup_jpxz001.exe" | C:\Program Files\Internet Explorer\iexplore.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Internet Explorer Exit code: 1 Version: 8.00.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 688 | "C:\Program Files\JiPinInput\2.2.1.1111\JPMBManager.exe" DownloadCellDictMb 2476,6904,6448,6452,6446,6447,6913,2491,4174 | C:\Program Files\JiPinInput\2.2.1.1111\JPMBManager.exe | — | JPWizard.exe | |||||||||||
User: admin Integrity Level: HIGH Description: 输入法词库工具 Exit code: 0 Version: 2,2,1,11201 Modules
| |||||||||||||||
| 792 | "C:\Windows\system32\taskmgr.exe" /4 | C:\Windows\system32\taskmgr.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Task Manager Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1448 | "C:\Program Files\JiPinInput\2.2.1.1111\JPWizard.exe" RunAutoLoadDict | C:\Program Files\JiPinInput\2.2.1.1111\JPWizard.exe | JPMutual.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: 输入法设置向导 Exit code: 0 Version: 2,2,1,11201 Modules
| |||||||||||||||
| 1520 | "C:\Program Files\JiPinInput\2.2.1.1111\JPPower32.exe" /InstallIME JiPinSrf | C:\Program Files\JiPinInput\2.2.1.1111\JPPower32.exe | JPMutual.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Version: 2,2,1,11201 Modules
| |||||||||||||||
| 1724 | "C:\Users\admin\Downloads\setup_jpxz001.exe" | C:\Users\admin\Downloads\setup_jpxz001.exe | — | explorer.exe | |||||||||||
User: admin Company: www.jpwb.net Integrity Level: MEDIUM Description: 极品输入法 Exit code: 3221226540 Version: 2,2,1,11201 Modules
| |||||||||||||||
| 2252 | "C:\Program Files\JiPinInput\2.2.1.1111\JPPower32.exe" /RegApkRelated | C:\Program Files\JiPinInput\2.2.1.1111\JPPower32.exe | — | JPMutual.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Version: 2,2,1,11201 Modules
| |||||||||||||||
| 2340 | "C:\Program Files\JiPinInput\2.2.1.1111\JPMutual.exe" InstallWuBiSpreadOperate jpxz001191219 | C:\Program Files\JiPinInput\2.2.1.1111\JPMutual.exe | setup_jpxz001.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: 输入法交互程序 Exit code: 0 Version: 2,2,1,11201 Modules
| |||||||||||||||
| 2440 | "C:\Users\admin\Downloads\setup_jpxz001.exe" | C:\Users\admin\Downloads\setup_jpxz001.exe | explorer.exe | ||||||||||||
User: admin Company: www.jpwb.net Integrity Level: HIGH Description: 极品输入法 Exit code: 0 Version: 2,2,1,11201 Modules
| |||||||||||||||
| (PID) Process: | (532) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main |
| Operation: | write | Name: | CompatibilityFlags |
Value: 0 | |||
| (PID) Process: | (532) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (532) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (532) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones |
| Operation: | write | Name: | SecuritySafe |
Value: 1 | |||
| (PID) Process: | (532) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (532) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
| (PID) Process: | (532) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active |
| Operation: | write | Name: | {746D5FA9-220A-11EA-AB41-5254004A04AF} |
Value: 0 | |||
| (PID) Process: | (532) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Type |
Value: 4 | |||
| (PID) Process: | (532) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Count |
Value: 2 | |||
| (PID) Process: | (532) iexplore.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore |
| Operation: | write | Name: | Time |
Value: E3070C0004001300020033001E000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 532 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DFA4B87CB5FF9C7A3F.TMP | — | |
MD5:— | SHA256:— | |||
| 532 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico | — | |
MD5:— | SHA256:— | |||
| 532 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
| 532 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\~DF9503362EC52690DF.TMP | — | |
MD5:— | SHA256:— | |||
| 532 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{746D5FA9-220A-11EA-AB41-5254004A04AF}.dat | — | |
MD5:— | SHA256:— | |||
| 2440 | setup_jpxz001.exe | C:\Users\admin\AppData\Local\Temp\my7zData.7z | — | |
MD5:— | SHA256:— | |||
| 3772 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat | dat | |
MD5:— | SHA256:— | |||
| 532 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{746D5FAA-220A-11EA-AB41-5254004A04AF}.dat | binary | |
MD5:— | SHA256:— | |||
| 3772 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.dat | dat | |
MD5:— | SHA256:— | |||
| 3772 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\JavaDeployReg.log | text | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1448 | JPWizard.exe | POST | — | 180.150.178.118:80 | http://dqxb.sgshurufa.com/cell.php?s=GetCell | CN | — | — | unknown |
2340 | JPMutual.exe | POST | — | 180.150.178.118:80 | http://tj.sgshurufa.com/server_OnGetInstallSignCode?UID=9c053e2f1102b7b78eac70e340b23e64&QID=jpxz001191219&SoftID=JiPin&IsOld=0&IsWB=0 | CN | — | — | unknown |
2440 | setup_jpxz001.exe | GET | 200 | 120.132.61.186:80 | http://tjv1.sgshurufa.com/statistics/timestamp | CN | text | 26 b | malicious |
3392 | JPWizard.exe | POST | — | 180.150.178.118:80 | http://dqxb.sgshurufa.com/cell.php?s=GetCell | CN | — | — | unknown |
3772 | iexplore.exe | GET | 200 | 163.171.132.119:80 | http://down.shusw.com/jpwb/gf/setup_jpxz001.exe | US | executable | 17.2 Mb | suspicious |
2340 | JPMutual.exe | GET | 200 | 47.89.39.18:80 | http://config.jpwb.net/softdata/jipin.dat | HK | binary | 446 b | malicious |
532 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
2340 | JPMutual.exe | POST | — | 180.150.178.118:80 | http://tj.sgshurufa.com/server_OnGetInstallSignCode?UID=9c053e2f1102b7b78eac70e340b23e64&QID=jpxz001191219&SoftID=JiPin&IsOld=0&IsWB=0 | CN | — | — | unknown |
292 | JPWizard.exe | POST | — | 180.150.178.118:80 | http://dqxb.sgshurufa.com/cell.php?s=GetCell | CN | — | — | unknown |
2340 | JPMutual.exe | POST | — | 180.150.178.118:80 | http://tj.sgshurufa.com/gswb_install_VUlELDljMDUzZTJmMTEwMmI3Yjc4ZWFjNzBlMzQwYjIzZTY0LFFJRCxqcHh6MDAxMTkxMjE5LFNvZnRJRCxKaVBpbixTb2Z0VmVyLDIuMi4xLjAsSXNPbGQsMCxJc1dCLDAsVGltZSwsU2lnbiwsTWFjSUQsOTU5NVBTNTU2TzhSOTMxTk85NTJTTjY5UDAxTzFTUDUsRGlza0lELERaNTU1NTYsQ3B1SUQsNlMzT1NPU1M1NTUwNTFSOA== | CN | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3772 | iexplore.exe | 163.171.132.119:80 | down.shusw.com | — | US | malicious |
532 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2440 | setup_jpxz001.exe | 120.132.61.186:80 | tjv1.sgshurufa.com | China Unicom Beijing Province Network | CN | malicious |
1448 | JPWizard.exe | 180.150.178.118:80 | dqxb.sgshurufa.com | China Unicom Beijing Province Network | CN | unknown |
2340 | JPMutual.exe | 180.150.178.118:80 | dqxb.sgshurufa.com | China Unicom Beijing Province Network | CN | unknown |
2340 | JPMutual.exe | 47.89.39.18:80 | config.jpwb.net | Alibaba (China) Technology Co., Ltd. | HK | malicious |
292 | JPWizard.exe | 180.150.178.118:80 | dqxb.sgshurufa.com | China Unicom Beijing Province Network | CN | unknown |
3392 | JPWizard.exe | 180.150.178.118:80 | dqxb.sgshurufa.com | China Unicom Beijing Province Network | CN | unknown |
Domain | IP | Reputation |
|---|---|---|
down.shusw.com |
| suspicious |
www.bing.com |
| whitelisted |
tjv1.sgshurufa.com |
| malicious |
downcell.sgshurufa.com |
| unknown |
dqxb.sgshurufa.com |
| unknown |
config.jpwb.net |
| malicious |
tj.sgshurufa.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3772 | iexplore.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2340 | JPMutual.exe | Misc activity | ADWARE [PTsecurity] Softcnapp.J PUP |
2340 | JPMutual.exe | Misc activity | ADWARE [PTsecurity] PUA.Softcnapp payload |