dailywiki.exe

The application dailywiki.exe has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘DailyWiki’. While running, it connects to the Internet address e1.ycpi.vip.deb.yahoo.com on port 443.
MD5:
97d066d112fd2d7bb6d52449c745750b

SHA-1:
82649b7327c1a8e60b81b1b77636504bf8033f5f

SHA-256:
ce071b63117f06543cab793f2abe3d9643912b098d92a29855b956cbdc935663

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 6:31:33 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Eorezo.DailyWiki (M)
17.2.19.20

File size:
45.6 MB (47,826,568 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\dailywiki\dailywiki.exe

File PE Metadata
Compilation timestamp:
1/14/2017 7:33:31 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x1C99451

Entry point:
E8, 9A, 3A, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 55, 0C, A1, 20, B8, EC, 02, F7, D2, 8B, 4D, 08, 23, D0, 23, 4D, 0C, 0B, D1, 89, 15, 20, B8, EC, 02, 5D, C3, E8, 09, 21, 00, 00, 85, C0, 74, 08, 6A, 16, E8, CC, 21, 00, 00, 59, F6, 05, 20, B8, EC, 02, 02, 74, 21, 6A, 17, E8, C9, 2D, 60, 00, 85, C0, 74, 05, 6A, 07, 59, CD, 29, 6A, 01, 68, 15, 00, 00, 40, 6A, 03, E8, A9, F8, FF, FF, 83, C4, 0C, 6A, 03, E8, 16, FC, FF, FF, CC, 55, 8B, EC, 8D, 45, 18, 50, 6A, 00, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75...
 
[+]

Code size:
34.9 MB (36,635,648 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
DailyWiki

Command:
C:\users\{user}\appdata\roaming\dailywiki\dailywiki.exe su


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to ig.com.ssl.d2.sc.omtrdc.net  (63.140.43.173:443)

TCP (HTTP):
Connects to host-62-24-179-206.as13285.net  (62.24.179.206:80)

TCP (HTTP):
Connects to host-62-24-179-197.as13285.net  (62.24.179.197:80)

TCP (HTTP):
Connects to host-62-24-179-190.as13285.net  (62.24.179.190:80)

TCP (HTTP):
Connects to host-62-24-179-168.as13285.net  (62.24.179.168:80)

TCP (HTTP):
Connects to host-62-24-179-127.as13285.net  (62.24.179.127:80)

TCP (HTTP):

TCP (HTTP SSL):
Connects to a104-127-17-139.deploy.static.akamaitechnologies.com  (104.127.17.139:443)

TCP (HTTP):
Connects to 62.24.179.8.akamai.man.as13285.net  (62.24.179.8:80)

TCP (HTTP SSL):
Connects to upload-lb.esams.wikimedia.org  (91.198.174.208:443)

TCP (HTTP SSL):
Connects to text-lb.esams.wikimedia.org  (91.198.174.192:443)

TCP (HTTP):
Connects to ec2-54-197-238-140.compute-1.amazonaws.com  (54.197.238.140:80)

TCP (HTTP):
Connects to a104-127-29-254.deploy.static.akamaitechnologies.com  (104.127.29.254:80)

TCP (HTTP):
Connects to rtr3.l7.search.vip.ir2.yahoo.com  (217.12.15.96:80)

TCP (HTTP SSL):
Connects to m203-mp1.cvx2-c.lng.dial.ntli.net  (62.252.188.203:443)

TCP (HTTP SSL):
Connects to cache.google.com  (195.122.16.44:443)

TCP (HTTP SSL):
Connects to a23-41-214-231.deploy.static.akamaitechnologies.com  (23.41.214.231:443)

TCP (HTTP SSL):
Connects to a104-82-253-234.deploy.static.akamaitechnologies.com  (104.82.253.234:443)

TCP (HTTP SSL):
Connects to a104-82-237-143.deploy.static.akamaitechnologies.com  (104.82.237.143:443)

TCP (HTTP SSL):
Connects to a104-82-229-178.deploy.static.akamaitechnologies.com  (104.82.229.178:443)

Remove dailywiki.exe - Powered by Reason Core Security