4089944420

Couponarific

This is the instaler for an an Adpeak program that shows ads in the browser without providing information about the ad's origin. Ads are injected as banners or text-links in random web pages. The file 4089944420 by Couponarific has been detected as adware by 10 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from d2baov6ticicd8.cloudfront.net.
Publisher:
Couponarific  (signed and verified)

MD5:
295c91238720d43053fe4f8ce865d7a8

SHA-1:
01b9c3358c8ba7a018a5b80dde2740d7e99f0ff5

SHA-256:
201f6e8916b6a2e5af7b895806db32dc4bf50036bda48e2922ab7b01cd0d09dd

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Injects advertisements in the web browser in the form or banner ads and popups.

Analysis date:
4/25/2024 9:28:46 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/Adware.Gen
7.11.188.216

avast!
Win32:Dropper-gen [Drp]
2014.9-141126

Dr.Web
Trojan.DownLoad3.35108
9.0.1.0330

ESET NOD32
Win32/Adware.Adpeak
8.10780

Malwarebytes
PUP.Optional.Couponarific
v2014.11.26.01

McAfee
Artemis!295C91238720
5600.6934

Qihoo 360 Security
HEUR/QVM42.0.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Couponarific.K
14.12.10.9

Sophos
Generic PUA LL
4.98

Trend Micro House Call
Suspicious_GEN.F47V1125
7.2.330

File size:
408.3 KB (418,112 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\4089944420

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
10/6/2014 1:12:43 PM

Valid to:
10/7/2015 1:12:43 PM

Subject:
E=support@couponarific.com, CN=Couponarific, O=Couponarific, L=Seattle, S=WA, C=US

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121D5217FDB68336D578AC0747743835652

File PE Metadata
Compilation timestamp:
10/6/2014 9:40:26 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:Ga7TlPfXP06Z1xjCfZkN9lvdqgRTuuNdB4ng1yR4:5TJ06ZfjOZU9llquTHHrI4

Entry address:
0x322E

Entry point:
81, EC, D8, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, A2, 40, 00, 89, 6C, 24, 14, FF, 15, 34, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, 34, 81, 40, 00, 55, FF, 15, AC, 82, 40, 00, 6A, 09, A3, 78, 4F, 43, 00, E8, FD, 2E, 00, 00, A3, C4, 4E, 43, 00, 55, 8D, 44, 24, 38, 68, B4, 02, 00, 00, 50, 55, 68, D8, B1, 42, 00, FF, 15, 7C, 81, 40, 00, 68, C0, A2, 40, 00, 68, C0, 3E, 43, 00, E8, 68, 2B, 00, 00, FF, 15, 38, 81, 40, 00, BB, 00, F0, 43, 00, 50, 53, E8, 56, 2B, 00, 00...
 
[+]

Entropy:
7.9559

Packer / compiler:
Nullsoft install system v2.x

Code size:
24.5 KB (25,088 bytes)

The file 4089944420 has been seen being distributed by the following URL.

http://d2baov6ticicd8.cloudfront.net/.../us.exe

Remove 4089944420 - Powered by Reason Core Security