java.exe

Lunacom Interactive Ltd

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Lunacom Interactive has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
Lunacom Interactive Ltd  (signed and verified)

Version:
4.0.6.33

MD5:
7f7424091933a49eb9e00dfa5276851f

SHA-1:
585b1897972ff44cff543534e3b7bf1d4d801753

SHA-256:
e57067f0c039f5b3e8bad95bd4585771b13cec95ac7c894e9b53a135d2e54ab1

Scanner detections:
33 / 68

Status:
Adware

Explanation:
May bundle additional potentially unwanted software such as adware during setup.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/16/2024 9:58:34 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.DomaIQ.N
849

Agnitum Outpost
PUA.DomaIQ
7.1.1

Avira AntiVirus
APPL/DomaIQ.Gen7
7.11.177.78

avast!
DomaIQ-AP [PUP]
141003-0

AVG
Adware DomaIQ.BM
2014.0.4037

Bitdefender
Application.Bundler.DomaIQ.N
1.0.20.1405

Clam AntiVirus
Win.Adware.Domaiq-135
0.98/19485

Comodo Security
Application.Win32.DomaIQ.KR
19739

Dr.Web
Trojan.Packed.24553
9.0.1.05190

ESET NOD32
MSIL/DomaIQ.B potentially unwanted application
7.0.302.0

Fortinet FortiGate
Adware/DomaIQ
10/8/2014

F-Prot
W32/DomaIQ.F.gen
v6.4.7.1.166

F-Secure
Application.Bundler.DomaIQ
11.2014-08-10_4

G Data
Application.Bundler.DomaIQ
14.10.24

IKARUS anti.virus
AdWare.DomaIQ
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.183.13619

Kaspersky
not-a-virus:Downloader.NSIS.Agent
15.0.0.494

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.10.08.02

McAfee
Adware-DomaIQ
5600.6983

MicroWorld eScan
Application.Bundler.DomaIQ.N
15.0.0.843

NANO AntiVirus
Trojan.Win32.Agent.ddrpmp
0.28.2.62483

Norman
DomaIQ.CERT
11.20141008

Panda Antivirus
PUP/MultiToolbar.A
14.10.08.02

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
TrojanDownLoder.AutoIt.Agent.AX
10.14.14.00

Reason Heuristics
PUP.LunacomInteractive.E
14.10.8.13

Sophos
Generic PUA HO
4.98

SUPERAntiSpyware
PUP.DomaIQ/Variant
10312

Trend Micro House Call
TROJ_SPNV.03L313
7.2.281

Trend Micro
TROJ_SPNV.03L313
10.465.08

Vba32 AntiVirus
OScope.Downware.DomaIQ
3.12.26.3

VIPRE Antivirus
Threat.4150696
33706

Zillya! Antivirus
Downloader.Agent.Win32.182488
2.0.0.1947

File size:
311.4 KB (318,912 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup (using Nullsoft Install System)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/6/2013 2:00:00 AM

Valid to:
12/6/2014 12:59:59 AM

Subject:
CN=Lunacom Interactive Ltd, OU="Raul Valenberg 6, ", OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Lunacom Interactive Ltd, L=Tel Aviv-Jaffa, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
15E496383F5A0396A7AD86D85850D5BB

File PE Metadata
Compilation timestamp:
7/14/2013 10:09:38 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:I+K0w1Vnr/l7OV06m+AWs0OuOT8N6iiQPN2ncf4V03py/C:JwHr/xOyRx0OfT8/xPU03oC

Entry address:
0x30DC

Entry point:
81, EC, 84, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 90, 91, 40, 00, 89, 5C, 24, 20, C6, 44, 24, 14, 20, FF, 15, 34, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 8C, 72, 40, 00, 6A, 08, A3, 78, 3F, 42, 00, E8, 73, 2D, 00, 00, A3, C4, 3E, 42, 00, 53, 8D, 44, 24, 38, 68, 60, 01, 00, 00, 50, 53, 68, 80, F4, 41, 00, FF, 15, 64, 71, 40, 00, 68, 80, 91, 40, 00, 68, C0, 36, 42, 00, E8, 1D, 2A, 00, 00, FF, 15, 1C, 71, 40, 00, BD, 00, 90, 42, 00, 50, 55, E8, 0B, 2A...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security