paranormal attivity 3.exe

Setup

Artua Vladislav

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions which inject ads in the browser. The application paranormal attivity 3.exe by Artua Vladislav has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. While running, it connects to the Internet address r1.stylezip.info on port 80 using the HTTP protocol.
Publisher:
Premium  (signed by Artua Vladislav)

Product:
Setup

Description:
Installer

Version:
2012.1.11.2029

MD5:
19121d6bb89c6351aa3489c42d6eff9c

SHA-1:
3c98d27535e7149ac2da94df1810e45121bea20c

SHA-256:
1d0fa4b6e83f57950c36a004dbe2417d02b016d229a9214811dd961be8e625ec

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses Web-Pick's 'File Product', an Installer which wraps various products and downloads and installs it silently through the process, hosted on TusFiles.

Analysis date:
4/26/2024 6:52:23 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.WebPick.ArtuaVladislav.Installer (M)
16.2.14.21

File size:
245.1 KB (250,936 bytes)

Product version:
1.0

Copyright:
Copyright © 2010 Premium

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Digital Signature
Signed by:

Authority:
The USERTRUST Network

Valid from:
3/14/2011 8:00:00 PM

Valid to:
3/14/2012 7:59:59 PM

Subject:
CN=Artua Vladislav, O=Artua Vladislav, STREET=haRav Dangur 22, L=Bnei Braq, S=Israel, PostalCode=51281, C=IL

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
302242B18FB354EA399140DBBA22B786

File PE Metadata
Compilation timestamp:
1/6/2012 1:12:06 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:YxJ9ujCpOkLS2ZEpjzUuTVJbW9+4d0KpgX3nw+nTKMvaPlk:YxJNpx+BpMK89xdLQ3n8zPlk

Entry address:
0x149F

Entry point:
55, 8B, EC, 81, EC, 24, 06, 00, 00, 53, 56, 33, F6, 57, 66, 89, B5, E4, FB, FF, FF, 89, 75, F4, 89, 75, FC, FF, 15, 68, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 64, 30, 40, 00, 89, 45, F8, 68, 04, 01, 00, 00, 8D, 85, DC, F9, FF, FF, 50, 56, FF, 15, 60, 30, 40, 00, 85, C0, 75, 22, FF, 15, 5C, 30, 40, 00, 50, 68, A0, 32, 40, 00, E8, 8A, FB, FF, FF, 59, 59, C7, 05, 0C, 44, 40, 00, FF, 00, 00, 00, E9, F7, 01, 00, 00, 56, FF, 15, 58, 30, 40, 00, 8B, 48, 3C, 03, C8, 66, 81, 38, 4D, 5A, 0F, 85, BC, 01, 00, 00, 81...
 
[+]

Entropy:
7.9445

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove paranormal attivity 3.exe - Powered by Reason Core Security