java.exe

Lunacom Interactive Ltd

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Lunacom Interactive has been detected as adware by 26 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Lunacom Interactive Ltd  (signed and verified)

Version:
4.0.6.33

MD5:
68674d381515d5a80c2031defc49d4a5

SHA-1:
e9708fe190cf74848ba79107f3dcd349f5a8fe5a

SHA-256:
756160f845d129ae7f15db5509092ff5b27c2437ae16baa66663238fe3928018

Scanner detections:
26 / 68

Status:
Adware

Explanation:
May bundle additional potentially unwanted software such as adware during setup.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/25/2024 12:17:15 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.DomaIQ
7.1.1

Avira AntiVirus
APPL/DomaIQ.Gen7
7.11.144.160

avast!
Win32:DomaIQ-AP [PUP]
2014.9-140421

AVG
DomaIQ
2015.0.3497

Comodo Security
Application.Win32.DomaIQ.KR
18142

Dr.Web
Trojan.Packed.24553
9.0.1.0111

ESET NOD32
MSIL/DomaIQ
8.9703

Fortinet FortiGate
Adware/DomaIQ
4/21/2014

F-Prot
W32/DomaIQ.A
v6.4.7.1.166

IKARUS anti.virus
AdWare.DomaIQ
t3scan.1.6.1.0

K7 AntiVirus
Trojan
13.176.11833

Kaspersky
not-a-virus:Downloader.NSIS.Agent
14.0.0.3982

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.04.21.03

McAfee
Adware-DomaIQ
5600.7153

NANO AntiVirus
Riskware.Nsis.Downloader.cnipyr
0.28.0.59492

Norman
DomaIQ.CERT
11.20140421

Panda Antivirus
PUP/MultiToolbar.A
14.04.21.03

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
TrojanDownLoder.AutoIt.Agent.AX
4.14.12.00

Reason Heuristics
PUP.LunacomInteractive.E
14.4.21.15

Sophos
Generic PUA HO
4.98

SUPERAntiSpyware
PUP.DomaIQ/Variant
10652

Trend Micro House Call
TROJ_SPNV.03L313
7.2.111

Trend Micro
TROJ_SPNV.03L313
10.465.21

Vba32 AntiVirus
Downloader.Agent
3.12.26.0

VIPRE Antivirus
DomaIQ
28466

File size:
311.4 KB (318,912 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/5/2013 8:00:00 PM

Valid to:
12/5/2014 6:59:59 PM

Subject:
CN=Lunacom Interactive Ltd, OU="Raul Valenberg 6, ", OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Lunacom Interactive Ltd, L=Tel Aviv-Jaffa, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
15E496383F5A0396A7AD86D85850D5BB

File PE Metadata
Compilation timestamp:
7/14/2013 4:09:38 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:I+K0w1Vnr/l7OV06m+AWs0OuOT8N6iiQPN2ncf4V03py/Cw:JwHr/xOyRx0OfT8/xPU03oCw

Entry address:
0x30DC

Entry point:
81, EC, 84, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 90, 91, 40, 00, 89, 5C, 24, 20, C6, 44, 24, 14, 20, FF, 15, 34, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 8C, 72, 40, 00, 6A, 08, A3, 78, 3F, 42, 00, E8, 73, 2D, 00, 00, A3, C4, 3E, 42, 00, 53, 8D, 44, 24, 38, 68, 60, 01, 00, 00, 50, 53, 68, 80, F4, 41, 00, FF, 15, 64, 71, 40, 00, 68, 80, 91, 40, 00, 68, C0, 36, 42, 00, E8, 1D, 2A, 00, 00, FF, 15, 1C, 71, 40, 00, BD, 00, 90, 42, 00, 50, 55, E8, 0B, 2A...
 
[+]

Entropy:
7.8817

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security