example –.exe

Sergey Petrov

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions using the JustPlug.it browser framework. The application example –.exe, “Installer for SuperbApp” by Sergey Petrov has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
SuperbApp  (signed by Sergey Petrov)

Product:
SuperbApp

Description:
Installer for SuperbApp

Version:
2014.4.8.1812

MD5:
b02c03e45d5d27961899bbd1c8a8c9aa

SHA-1:
4b27114f3bc80cbcc23537a44c50ad8b0f677242

SHA-256:
9c9a5cafb5c3e8a1d0e090ccf981b3bbed092ec1ce87b4fef9714fbf56d4f89f

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/23/2024 10:13:52 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.623310
994

Agnitum Outpost
Trojan.AntiFW
7.1.1

Avira AntiVirus
TR/AntiFW.b.86
7.11.150.60

avast!
Win32:InstalleRex-BI [PUP]
140516-1

AVG
Generic
2015.0.3472

Bitdefender
Application.Generic.623310
1.0.20.685

Comodo Security
Application.Win32.InstalleRex.KG
18286

Dr.Web
Trojan.WebPick.29
9.0.1.0137

ESET NOD32
Win32/InstalleRex (variant)
8.9813

F-Secure
Application.Generic.623310
11.2014-17-05_7

G Data
Application.Generic.623310
14.5.24

IKARUS anti.virus
PUP.Downloader
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.12109

Kaspersky
Trojan.Win32.AntiFW
14.0.0.3853

Malwarebytes
PUP.Optional.InstalleRex
v2014.05.17.11

McAfee
PUP-FHQ!B02C03E45D5D
5600.7128

MicroWorld eScan
Application.Generic.623310
15.0.0.411

NANO AntiVirus
Riskware.Win32.InfoLeak.cvgqot
0.28.0.59911

nProtect
Trojan/W32.AntiFW.323728
14.05.16.01

Panda Antivirus
PUP/TSUploader
14.05.17.11

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Trojan.AntiFW.A5
5.14.14.00

Reason Heuristics
Adware.WebPick.Installer.J
14.5.17.10

Rising Antivirus
PE:PUF.InstallRex!1.9E4C
23.00.65.14515

Sophos
InstallRex
4.98

Vba32 AntiVirus
Downloader.AdLoad
3.12.26.0

VIPRE Antivirus
Trojan.Win32.Generic
29306

Zillya! Antivirus
Trojan.AntiFW.Win32.180
2.0.0.1791

File size:
316.1 KB (323,728 bytes)

Product version:
1.0.0.3

Copyright:
Copyright © 2014 SuperbApp

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\example –.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/20/2013 7:00:00 PM

Valid to:
8/21/2014 6:59:59 PM

Subject:
CN=Sergey Petrov, O=Sergey Petrov, STREET=Gaydara 13, L=Kyev, S=Kyev, PostalCode=01033, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0AD084E865D27CD546D21DB6EDF89D48

File PE Metadata
Compilation timestamp:
3/12/2013 3:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:6ribUzkuvcBYC47l2xLNaFmoKZLxtHU/TMDkW01eedmQb+x7:6r7kuveY33FJUo7MDkA6u

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file example –.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

TCP (HTTP):
Connects to c1.stylezip.info  (54.186.255.26:80)

 
http://c1.stylezip.info/?step_id=1&installer_id=5345054&publisher_id=345&source_id=0&page_id=0&country_code=US&locale=US&browser_id=4&download_id=16035162&external_id=0&session_id=32070324&hardware_id=37415378&installer_file_name=example+–

Remove example –.exe - Powered by Reason Core Security