icreinstall_zipsetup.exe

JumpyApps

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_zipsetup.exe by JumpyApps has been detected as adware by 10 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address hosted-by.leaseweb.com on port 80 using the HTTP protocol.
Publisher:
JumpyApps  (signed and verified)

MD5:
2df7901b8e1182720f17c46993b9a21d

SHA-1:
df8290dc4f6204071dba6b0a705a4b76a64af0af

SHA-256:
818c39a0de5eb87788a657a2297cfaec2dbfb1948fe53e57fd9271cd172df87b

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/24/2024 8:45:16 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.140.216

Dr.Web
Trojan.Packed.24524
9.0.1.0219

ESET NOD32
Win32/InstallCore.IT potentially unwanted application
8.7.0.302.0

G Data
Win32.Application.InstallCore
14.8.24

Malwarebytes
PUP.Optional.Jumpyapps
v2014.08.07.06

Reason Heuristics
PUP.Installer.JumpyApps.U
14.8.7.18

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.14805

Vba32 AntiVirus
3.12.24.3

VIPRE Antivirus
Threat.4786018
29396

File size:
664.9 KB (680,904 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_zipsetup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
2/18/2013 7:00:00 AM

Valid to:
2/19/2014 6:59:59 AM

Subject:
CN=JumpyApps, O=JumpyApps, STREET=63 Rothschild Blvd., L=Tel Aviv, S=NA, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
6DB423F9C6473168CF486AAF112EDD5C

File PE Metadata
Compilation timestamp:
6/20/1992 5:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:xvppsU98KiCkAa+D+EJW0FkAkWutiK0Os/F+pJGoGT127dWVLS6zbRw+svZ7U:xvrsc0C6+L80qAluF0P0GokRrwb7

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8298

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to hosted-by.leaseweb.com  (199.58.87.155:80)

TCP (HTTP):
Connects to ec2-54-245-111-201.us-west-2.compute.amazonaws.com  (54.245.111.201:80)

TCP (HTTP):
Connects to ec2-54-244-230-64.us-west-2.compute.amazonaws.com  (54.244.230.64:80)

TCP (HTTP):
Connects to 92b91b35.rdns.100tb.com  (146.185.27.53:80)

Remove icreinstall_zipsetup.exe - Powered by Reason Core Security