icreinstall_daemon-tools-lite-44710333-baixaki-32-bits-81378c488f5a3739da0d31377c566023.exe

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_daemon-tools-lite-44710333-baixaki-32-bits-81378c488f5a3739da0d31377c566023.exe has been detected as adware by 23 anti-malware scanners. The program is a setup application that uses the installCore installer, however the file is not signed with an authenticode signature from a trusted source. According to Microsoft Security Essentials, the software includes a bundle of the DealPly adware which is installed on a user's PC during setup using the InstallCore platform.
MD5:
0ae5b63a1ecb5791ebeb0d6abf282476

SHA-1:
81715e95a98524594a71ccd29fa3f01dbf0c9b5c

SHA-256:
33dc034b5132da8618d01f703faa0bc1838e04a734c3fc6a7e8a4bdf9e81aa8c

Scanner detections:
23 / 68

Status:
Adware

Explanation:
This software bundler installs other potentially unwanted software, including DealPly. Which includes offers in a user's web browser which state they are "Powered by DealPly".

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/25/2024 1:05:13 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.InstallCore
7.1.1

Avira AntiVirus
Adware/Installco.AB
7.11.137.202

avast!
Win32:Downloader-TPU [PUP]
2014.9-140525

Bkav FE
W32.Clod1e8.Trojan
1.3.0.4959

Comodo Security
ApplicUnwnt
17951

Dr.Web
Adware.InstallCore.122
9.0.1.0145

ESET NOD32
Win32/InstallCore.BL
8.9558

Fortinet FortiGate
W32/InstallCore.BL
5/25/2014

F-Prot
W32/InstallCore.R3.gen
v6.4.7.1.166

IKARUS anti.virus
SoftwareBundler
t3scan.2.2.29

K7 AntiVirus
Trojan
13.176.11482

Malwarebytes
v2014.05.25.10

McAfee
Artemis!0AE5B63A1ECB
5600.7120

Microsoft Security Essentials
1.10401

Qihoo 360 Security
Win32/Virus.Adware.dc7
1.0.0.1015

Reason Heuristics
PUP.InstallCore.?
14.5.25.10

Rising Antivirus
PE:Malware.InstallCore!6.4
23.00.65.14523

Sophos
Generic PUA KF
4.98

SUPERAntiSpyware
10584

Trend Micro House Call
TROJ_SPNR.0BDG14
7.2.145

Trend Micro
TROJ_SPNR.0BDG14
10.465.25

Vba32 AntiVirus
3.12.24.3

VIPRE Antivirus
InstallCore
27514

File size:
634.1 KB (649,304 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_daemon-tools-lite-44710333-baixaki-32-bits-81378c488f5a3739da0d31377c566023.exe

File PE Metadata
Compilation timestamp:
6/19/1992 11:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:PMJfstuLxoGtouRR61NSgqo4/md8SZNKk4uj1w86z2J8WKNK6ERtUd89:PMJfsoNYuRR61NSgqj/mTNKk4awYyxKT

Entry address:
0x98CC

Entry point:
55, 8B, EC, 83, C4, CC, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, FA, 97, FF, FF, E8, 01, AA, FF, FF, E8, 2C, CC, FF, FF, E8, 73, CC, FF, FF, E8, 0A, F3, FF, FF, E8, 71, F4, FF, FF, 33, C0, 55, 68, 76, 9F, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 2C, 9F, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, B0, 40, 00, E8, 9B, FE, FF, FF, E8, 26, FA, FF, FF, 8D, 55, F0, 33, C0, E8, E0, D0, FF, FF, 8B, 55, F0, B8, D8, BD, 40, 00, E8, AB, 98, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, D8, BD, 40, 00, B2, 01, B8...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
36 KB (36,864 bytes)

The file icreinstall_daemon-tools-lite-44710333-baixaki-32-bits-81378c488f5a3739da0d31377c566023.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdneu.webfilescdn.com  (65.254.40.36:80)