nettocksetup.exe

NetTock

This is the installer and setup program from the NetTock branded Yontoo adware web browser extension. This adware injects various forms of advertisements in the user's web browser based on the HTML content and URLs viewed. Ad include banners, in-line context text links, coupons, and search. The program will install an auto-updating Windows service that will update the software with additional features. The executable nettocksetup.exe by NetTock has been known to be a potentially unwanted program that has been detected by 4 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer.
Publisher:
NetTock  (signed and verified)

MD5:
bf9d95278076e8f52bb647466a2a3a2a

SHA-1:
6069886d46654edc5477072c4608b3cea8de3ee5

SHA-256:
879f9bdefe39db4e65847caa18a630393f382025d21f4a8fed1d54b0bfead049

Scanner detections:
4 / 68

Status:
Inconclusive but possibly unwanted  (There is not enough data for a 100% detection)

Analysis date:
4/26/2024 10:39:20 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
BrowseFox
2015.0.3488

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.14429

Trend Micro House Call
TROJ_GEN.F47V0320
7.2.121

VIPRE Antivirus
Yontoo
28742

File size:
227.6 KB (233,088 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\nettocksetup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/12/2014 1:00:00 AM

Valid to:
1/13/2015 12:59:59 AM

Subject:
CN=NetTock, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=NetTock, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
41BB672E3BDED612E4F80C8809E8DF4C

File PE Metadata
Compilation timestamp:
12/5/2009 11:52:01 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:3Z+11Rwpx3g7VmapnL/1RWBT5AYZm/G/HcJ:82x2nb1s15AB/G/8J

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file nettocksetup.exe has been seen being distributed by the following 2 URLs.

http://i.nextupsw.com/inst/software/AF610AD5-6AD3-4EA8-97B6-1CFD8DD2279E/.../NetTockSetup.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Scan nettocksetup.exe - Powered by Reason Core Security