ext_setup.exe

Ostap Laponov

This program bundles adware during the download and install process using the InstaleRex pay-per-install app monetizer. The application ext_setup.exe by Ostap Laponov has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the WebPick InstalleRex installer. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address r1.stylezip.info on port 80 using the HTTP protocol.
Publisher:
Ostap Laponov  (signed and verified)

MD5:
afdb4e6eaddfcd6cabe71870e9324dc3

SHA-1:
bab820ee41327d7242b50d3bd70311877ef2ae34

SHA-256:
f739b5f263bf6f90ce6bbd5af6cfaf43b04700db4656b431a133ceba5583948c

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses Web-Pick's 'File Product', an Installer which wraps various products and downloads and installs it silently through the process.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/26/2024 7:18:45 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.WebPick (M)
17.3.11.20

File size:
684.2 KB (700,632 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
WebPick InstalleRex

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\addons\ext_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/8/2013 7:00:00 PM

Valid to:
9/9/2014 6:59:59 PM

Subject:
CN=Ostap Laponov, O=Ostap Laponov, STREET=Minskаya 16, L=Kiev, S=Kiev, PostalCode=04078, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00EA64F94CDE70375038736C9F1C0960DF

File PE Metadata
Compilation timestamp:
12/2/2013 10:27:36 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

Entry address:
0x10687

Entry point:
E8, 38, 3F, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, 28, F0, 41, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, 2C, F0, 41, 00, 5D, C3, 05, 44, FF, FF, FF, 6A, 0E, 59, 3B, C8, 1B, C0, 23, C1, 83, C0, 08, 5D, C3, E8, DC, 07, 00, 00, 85, C0, 75, 06, B8, 90, F1, 41, 00, C3, 83, C0, 08, C3, E8, C9, 07, 00, 00, 85, C0, 75, 06, B8, 94, F1, 41, 00, C3, 83, C0, 0C, C3, 8B, FF, 55, 8B, EC, 56, E8, E2, FF, FF, FF, 8B, 4D, 08...
 
[+]

Entropy:
7.8584  (probably packed)

Code size:
96 KB (98,304 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove ext_setup.exe - Powered by Reason Core Security