installer_whatsapp_english.exe

Web

Setup Delivery (Fried Cookie Ltd.)

The Fried Cookie installer utilizes the InstallCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application installer_whatsapp_english.exe, “Web Setup ” by Setup Delivery (Fried Cookie) has been detected as adware by 25 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
Setup Delivery (Fried Cookie Ltd.)  (signed and verified)

Product:
Web

Description:
Web Setup

MD5:
feb9d72776be8ba9b14c8cce3cc42e41

SHA-1:
70c23afbd6b02c0c6ab1b885f1f591ba1de5bfda

SHA-256:
95483212cceea7f623f3038162a6a0982c471f0e38f551880f1557a9b1aefb30

Scanner detections:
25 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/24/2024 7:12:52 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.InstallCore
7.1.1

Avira AntiVirus
Adware/InstallCo.zlz
7.11.205.178

avast!
Dropper-gen [Drp]
2014.9-150327

AVG
Generic
2016.0.3158

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.15327

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Installcore-651
0.98/20043

Comodo Security
Application.Win32.FriedCookie.CIRK
20874

Dr.Web
Trojan.InstallCore.49
9.0.1.086

ESET NOD32
Win32/InstallCore.XS potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/InstallCore
3/27/2015

G Data
Win32.Application.InstallCore.DI
15.3.25

IKARUS anti.virus
AdWare.InstallCo
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.203.15866

Malwarebytes
v2015.07.02.02

McAfee
Trojan.Artemis!05FEC56DAAAA
5600.6814

NANO AntiVirus
Riskware.Win32.InstallCore.dnajwn
0.30.24.1357

Qihoo 360 Security
Win32/Virus.Adware.94c
1.0.0.1015

Reason Heuristics
PUP.Installer.InstallCore.Installer
15.4.11.23

Sophos
PUA 'Install Core'
5.14

Total Defense
Win32/Tnega.JMMQZQD
37.1.62.1

Trend Micro House Call
Suspicious_GEN.F47V0124
7.2.86

Trend Micro
TROJ_GEN.R02ZC0OBE15
10.465.12

VIPRE Antivirus
Threat.4150696
39676

File size:
741.8 KB (759,608 bytes)

Product version:
3.8

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
1/14/2015 4:44:35 AM

Valid to:
1/15/2016 4:44:35 AM

Subject:
CN=Setup Delivery (Fried Cookie Ltd.), O=Setup Delivery (Fried Cookie Ltd.), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
11210A6522A1A7E7C584A5E3B94F933EE6EA

File PE Metadata
Compilation timestamp:
6/19/1992 7:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:VuFa+fpe7ITfOoDiZ2O5mxnrzlQ4R8iRZMHNuWDc2TbQYUT9xjKCl8++v:VuF7fpe7upDiOxr5g6MHJQSbc2Cl8p

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, BF, A9, FF, FF, E8, 5E, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file installer_whatsapp_english.exe has been seen being distributed by the following URL.

Remove installer_whatsapp_english.exe - Powered by Reason Core Security