foxyjumper2wa_23530.exe

Setup

WEB PICK - INTERNET HOLDINGS LTD

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions which inject ads in the browser. The application foxyjumper2wa_23530.exe by WEB PICK - INTERNET HOLDINGS has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. While running, it connects to the Internet address r1.stylezip.info on port 80 using the HTTP protocol.
Publisher:
Premium  (signed by WEB PICK - INTERNET HOLDINGS LTD)

Product:
Setup

Description:
Installer

Version:
2012.5.14.1430

MD5:
bd330af7f23f4e0367211df2d841bb95

SHA-1:
d9dc74ab69af0ea28caf0cad5adc42a0d0cdda04

SHA-256:
ab42125992ab40b836994f998aa18f3c750e27c08f8114cdd7c73a53459a3e34

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses Web-Pick's 'File Product', an Installer which wraps various products and downloads and installs it silently through the process, hosted on TusFiles.

Analysis date:
4/18/2024 3:24:57 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.WebPick.WEBPICKINTERNETHOLDINGS.Installer (M)
16.2.15.14

File size:
263.3 KB (269,664 bytes)

Product version:
1.0

Copyright:
Copyright © 2010 Premium

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Common path:
C:\users\{user}\downloads\foxyjumper2wa_23530.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
2/25/2012 1:00:00 AM

Valid to:
3/23/2013 12:59:59 AM

Subject:
CN=WEB PICK - INTERNET HOLDINGS LTD, O=WEB PICK - INTERNET HOLDINGS LTD, L=Ramat Hasharon, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
69BA3E5E7FA6543891BD41AC3F494F15

File PE Metadata
Compilation timestamp:
5/7/2012 6:44:06 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:qP7M4kmSjw/GYjgMOGHuHyohoa594f7wKqqyxzgzYz:qP7ZbBLuHyS3+wKqnBgzYz

Entry address:
0x14A3

Entry point:
55, 8B, EC, 81, EC, 24, 06, 00, 00, 53, 56, 33, F6, 57, 66, 89, B5, E4, FB, FF, FF, 89, 75, F4, 89, 75, FC, FF, 15, 68, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 64, 30, 40, 00, 89, 45, F8, 68, 04, 01, 00, 00, 8D, 85, DC, F9, FF, FF, 50, 56, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, BC, 32, 40, 00, E8, 82, FB, FF, FF, 59, C7, 05, 0C, 44, 40, 00, FD, 00, 00, 00, E9, 13, 02, 00, 00, 50, 68, 98, 32, 40, 00, E8, 67, FB, FF, FF, 59, 59, C7, 05, 0C, 44, 40, 00, FF, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove foxyjumper2wa_23530.exe - Powered by Reason Core Security