aqielzrw.exe

Zombie Alert Service

Creative Island Media, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The application aqielzrw.exe by Creative Island Media has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “aqiELZRw”. While running, it connects to the Internet address update.betterxperience.com on port 80 using the HTTP protocol.
Publisher:
Creative Island Media, LLC  (signed and verified)

Product:
Zombie Alert Service

Version:
1.0.0.0

MD5:
d703439b1f7633af0db58bc8da7a9af8

SHA-1:
7be242da786576baa2cc0b256bc9b19c2841420d

SHA-256:
f703a568c7f5cb9b6f760070910e66dacf29750f9bea3c2814005b0d5b2cfe18

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/26/2024 12:11:13 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt.CreativeIslandMedia (M)
16.2.2.13

File size:
2.2 MB (2,298,232 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Creative Island Media, LLC 2014

Original file name:
ZombieAlertService.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\ProgramData\fifqrvrfbfr\aqielzrw.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/24/2014 1:00:00 AM

Valid to:
6/24/2015 1:59:59 AM

Subject:
CN="Creative Island Media, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Creative Island Media, LLC", L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0ED42A15C608C5CB28B1EF56CE392E5E

File PE Metadata
Compilation timestamp:
6/9/2014 11:41:27 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
49152:3pMtRjomgggajwkvXoVfUPJ7NuPudK0jjmHinydHG22xi8yUdSm/m43pO+:3ytRUmDMkfqk5OudK0jiHDpTAjdSh43X

Entry address:
0x230A8E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.2 MB (2,288,640 bytes)

Service
Display name:
aqiELZRw

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.betterxperience.com  (54.218.62.24:80)

TCP (HTTP):
Connects to d.pullupdate.com  (54.230.15.37:80)

Remove aqielzrw.exe - Powered by Reason Core Security