download.exe

Eran Vaterfeld

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions using the JustPlug.it browser framework. The application download.exe, “Installer for SummerSoft” by Eran Vaterfeld has been detected as adware by 38 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
SummerSoft  (signed by Eran Vaterfeld)

Product:
SummerSoft

Description:
Installer for SummerSoft

Version:
2013.9.16.1852

MD5:
e77864037a803412cc303b6d8191bc98

SHA-1:
aa345618d1bb35c5505351d109913b768e374b2a

SHA-256:
ebc7c207cfc0fc54317c53347aeba28c9fd45cba59415f3b0a67cf75315a60fc

Scanner detections:
38 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
5/9/2024 8:32:29 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.InstallRex.2
453

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
15.11.08

Avira AntiVirus
TR/Rogue.9595794
7.11.141.180

avast!
Win32:InstalleRex-Z [PUP]
2014.9-151108

AVG
Adware Skodna.Generic
2016.0.2931

Bitdefender
Gen:Variant.Application.Bundler.InstallRex.2
1.0.20.1560

Bkav FE
W32.FamVT.AntiFWK.Trojan
1.3.0.4959

Clam AntiVirus
Win.Adware.577708
0.98/19297

Comodo Security
Application.Win32.InstalleRex.KG
18064

Dr.Web
Adware.Downware.1442
9.0.1.0312

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.InstallRex
8.15.11.08.11

ESET NOD32
Win32/InstalleRex.K potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/InstalleRex
11/8/2015

F-Prot
W32/InstallRex.B
v6.4.6.5.141

F-Secure
Riskware.Gen:Variant.Application.Bundler
11.2015-08-11_1

G Data
Win32.Application.InstalleRex
15.11.24

IKARUS anti.virus
PUP.InstallRex
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11684

Kaspersky
not-a-virus:HEUR:Downloader.Win32.AdLoad
14.0.0.1150

Malwarebytes
PUP.Optional.Installrex
v2015.11.08.11

McAfee
PUP-FDX!B50872A2FFF2
5600.6587

MicroWorld eScan
Gen:Variant.Application.Bundler.InstallRex.2
16.0.0.936

NANO AntiVirus
Riskware.Win32.Downware.ctkpjj
0.28.0.58873

Norman
Gen:Variant.Application.Bundler.InstallRex.2
11.20151108

nProtect
Trojan/W32.StartPage.306848
14.04.27.01

Panda Antivirus
PUP/TSUploader
15.11.08.11

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Trojan.AntiFW.B5
11.15.14.00

Reason Heuristics
Adware.WebPick.Installer (M)
15.11.8.23

Rising Antivirus
PE:PUF.InstallRex!1.9E4C
23.00.65.151106

Sophos
InstallRex
4.98

SUPERAntiSpyware
Adware.InstalleRex/Variant
9519

Trend Micro House Call
TROJ_GEN.USCK25ACN
7.2.312

Trend Micro
TROJ_GEN.USCK25ACN
10.465.08

Vba32 AntiVirus
Downloader.AdLoad
3.12.26.0

VIPRE Antivirus
Installerex/WebPick
28115

Zillya! Antivirus
Downloader.Adload.Win32.16801
2.0.0.1797

File size:
299.7 KB (306,888 bytes)

Product version:
1.0.0.1

Copyright:
Copyright © 2012 SummerSoft

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\download.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/9/2013 8:00:00 PM

Valid to:
7/10/2014 7:59:59 PM

Subject:
CN=Eran Vaterfeld, O=Eran Vaterfeld, STREET=Shtruk 15, L=Tel Aviv, S=Tel Aviv, PostalCode=64042, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00CF0201F072612C73F4F11FE23420B802

File PE Metadata
Compilation timestamp:
3/12/2013 4:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:Xrka9uEo2S1YnQmCX492DkwNP3qpYF1aZpbdnMne3SLFjpjhGdO503+rhco:XrkCu6/eIo4Zf5nMmOjVG+X

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9580

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file download.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

TCP (HTTP):
Connects to c1.stylezip.info  (54.186.255.26:80)

 
http://c1.stylezip.info/?step_id=1&installer_id=33591198&publisher_id=359&source_id=0&page_id=0&country_code=US&locale=US&browser_id=4&download_id=100773594&external_id=0&session_id=201547188&hardware_id=235138386&installer_file_name=download

Remove download.exe - Powered by Reason Core Security