haobrazil_p1v0.exe

OpenCandy Inc.

The application haobrazil_p1v0.exe by OpenCandy has been detected as adware by 2 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars.
Publisher:
OpenCandy Inc.  (signed and verified)

MD5:
dc266182424a74383a40eb3095c975c4

SHA-1:
0ad1b7833568f28ed05bdb4d48d7fd178b36b8df

SHA-256:
255d5571385122148c36cea3a58dcd94f9a3c24409d9d7e3cc15b0a5ea448dec

Scanner detections:
2 / 68

Status:
Adware

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
8/8/2014 12:53:33 AM UTC  (four months ago)

Scan engine
Detection
Engine version

ESET NOD32
Win32/OpenCandy (variant)
8.8944

Reason Heuristics
PUP.OpenCandy.O
14.8.7.20

File size:
757.3 KB (775,448 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\user\appdata\roaming\opencandy\47c910aa1a2a4f13a3cf91478123a5f4\haobrazil_p1v0.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/24/2011 10:00:00 PM

Valid to:
3/14/2014 8:59:59 PM

Subject:
CN=OpenCandy Inc., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=OpenCandy Inc., L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6FFC263A351134194CF16E1E6D0E0806

File PE Metadata
Compilation timestamp:
2/24/2012 4:19:54 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:tCXl3HhHgCCOeNwgYMJ1zl+wnbOtR3gXusd1Q4YuWvRo4OX/D+jxq1YiRskkqGyE:tQthACNgPJ1B+wnbCqPjQ4nWRFyL+j0A

Entry address:
0x3883

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, 68, 92, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 80, 40, 00, 55, FF, 15, C0, 82, 40, 00, 6A, 08, A3, B8, 2E, 47, 00, E8, 36, 2A, 00, 00, 55, 68, B4, 02, 00, 00, A3, D0, 2D, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 64, 92, 40, 00, FF, 15, 84, 81, 40, 00, 68, 4C, 92, 40, 00, 68, C0, AD, 46, 00, E8, 18, 27, 00, 00, FF, 15, B0, 80, 40, 00, 50, BF, A0, 30, 4C, 00, 57, E8, 06, 27, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
27.5 KB (28,160 bytes)

There are numerous known code variantions that share the same compilation structure.

5 / 68      (Adware)
internalwrapper.exe  (fb42dc7b014c31501c563eb194761bc426e82340)

3 / 68      (Adware)
realplayerr71poc2_p19v1.exe  (f1389dede16e68e53b4c4d6f185c75680db7b553)

2 / 68      (Adware)
pc_faster_setupbr_p1v6.exe  (0a56eb34241bec044f31f341264879ad8994cedc)

1 / 68      (Adware)
divx_p1v0.exe  (d0a8b8c3587e1badbccae07463d99e7007cab45f)

2 / 68      (Adware)
speedupmypcus_p2v0.exe  (aae5c434231c607a00a9c0676d8e42be2f3f5c95)

7 / 68      (Adware)
linkuryinstaller_p1v11.exe  (7217373ed08487e1be2d73357e00396efe2457ba)

4 / 68      (Adware)
keydownloader_p1v5.exe  (3a299bfc8152f7f5e5da704cbda00f19b5221681)

6 / 68      (Adware)
bingsearch_hpds_p2v5.exe  (8985a07497494b1c6c8912e40013ce1321eb0c88)

1 / 68      (Adware)
setup1004725_au.exe  (e5c5cdc0ed1d14112c591b307df2af70718f3bbb)

3 / 68      (Adware)
ws_p2v2.exe  (a60e646f253cc153323c171ef96787a4a0c105a7)

3 / 68      (Adware)
adblockplus-chrome_p1v3.exe  (cbc17c4b344daa0ace930611539b23f5e9024e68)

1 / 68      (Adware)
tuneuputilities2013-2200278-p3v0.exe  (5099c4a28b54912c6b18ae094600fe995a50c430)

3 / 68      (Adware)
passwordboxchstore_p1v0.exe  (1719aeb11a169cb1a3c55af11f2cb2b1b6c490bf)

1 / 68      (Adware)
trendmicro_dp_us-en_p1v0.exe  (f2e234e08dd247ec3562762a8c20e0e37be4b38d)

1 / 68      (Adware)
avg-tuneup-bel-1day_p3v0.exe  (0f021bd13f0a12d192b4643e2323883a5040b87a)

10 / 68    (Adware)
OCSetupHlp.dll  (a717417eeeb416c4a65aa265f43a1bde1c88b93e)

4 / 68      (Adware)
ignite_dlmgr_249.exe  (95be672c907092b4da70b87c9607e3ebf816117e)

6 / 68      (Adware)
dsplyhlpr10701a.dll  (ec1dd93d402b406c08745112c5dec1f28bfb8073)

48 / 68    (Adware)
latestdlmgr.exe  (2c4e78cdf9ca4a5b43ad91715da16069c684dc67)

Detection Incidence by Country