hypenetsetup.exe

HypeNet

This is the installer and setup program from the HypeNet branded Yontoo adware web browser extension. This adware injects various forms of advertisements in the user's web browser based on the HTML content and URLs viewed. Ad include banners, in-line context text links, coupons, and search. The program will install an auto-updating Windows service that will update the software with additional features. The application hypenetsetup.exe by HypeNet has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer.
Publisher:
HypeNet  (signed and verified)

MD5:
973d254428e90ebaa422cb120602befc

SHA-1:
9f84ff1500cc1e32888a4db3b2911b13aa770ac3

SHA-256:
d17473b09063f5c736515a6161894a20f473c37ab1e7536e3fae22f5b32467db

Scanner detections:
5 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
4/29/2024 6:05:29 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.Downloader
2014.03.10

McAfee
Artemis!973D254428E9
5600.7196

Reason Heuristics
PUP.Installer.HypeNet.M
14.3.29.10

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.14308

Trend Micro House Call
TROJ_GEN.F47V0221
7.2.69

File size:
227.4 KB (232,864 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\hypenetsetup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/9/2014 1:00:00 AM

Valid to:
1/10/2015 12:59:59 AM

Subject:
CN=HypeNet, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=HypeNet, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1FBAF70F51194AE01BD4FAB2931DA43A

File PE Metadata
Compilation timestamp:
12/5/2009 11:52:01 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:LZ+1196O/V7O2MZ47X/1RWBT5AYZm/G/Hcf:EP82G47P1s15AB/G/8f

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file hypenetsetup.exe has been seen being distributed by the following 2 URLs.

http://vzbucket.appscion.com/.../HypeNetSetup.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Remove hypenetsetup.exe - Powered by Reason Core Security