primarycolorsetup.exe

Primary Color

This is the installer and setup program from the Primary Color branded Yontoo adware web browser extension. This adware injects various forms of advertisements in the user's web browser based on the HTML content and URLs viewed. Ad include banners, in-line context text links, coupons, and search. The program will install an auto-updating Windows service that will update the software with additional features. The application primarycolorsetup.exe by Primary Color has been detected as adware by 19 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Primary Color  (signed and verified)

MD5:
82435e91029e0163b6e09392b5bf43c8

SHA-1:
ede7b2f4294fd342a7969358224dd222ebdf78e2

SHA-256:
e8dfaddb5193a74c9e0f297ac01e6c0ac1d9bacf2262869036818b0b024e0008

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/25/2024 1:30:09 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
ADWARE/BrowseFox.Gen
8.3.1.6

AVG
Could be an adware BrowseFox
2014.0.4311

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15523

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Yontoo.1837
9.0.1.05190

ESET NOD32
Win32/BrowseFox.AV potentially unwanted application
7.0.302.0

IKARUS anti.virus
PUA.BrowseFox
t3scan.1.8.9.0

K7 AntiVirus
Unwanted-Program
13.204.16007

Kaspersky
not-a-virus:HEUR:AdWare.NSIS.Zaitu
14.0.0.1998

Malwarebytes
PUP.Optional.PrimaryColor.A
v2015.05.23.10

McAfee
Trojan.Artemis!82435E91029E
18.0.204.0

NANO AntiVirus
Trojan.Win32.Siggen6.droatj
0.30.24.1636

Panda Antivirus
PUP/BrowseFox
15.05.23.10

Qihoo 360 Security
Win32/Virus.Adware.80e
1.0.0.1015

Reason Heuristics
PUP.Yontoo.Installer
15.5.23.6

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.15521

Sophos
Generic PUA ON
4.98

VIPRE Antivirus
Threat.4150696
40432

File size:
454.2 KB (465,144 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\primarycolorsetup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/15/2015 1:00:00 AM

Valid to:
1/16/2016 12:59:59 AM

Subject:
CN=Primary Color, O=Primary Color, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
25DC34062844409A5E421392BA5A17B2

File PE Metadata
Compilation timestamp:
12/5/2009 11:52:01 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:xWV8KuT2pAS1s15Ap/G/8g3D0Fw/tN8dkmLtpHHHrh7u:xWV7+8D6j8gz0FmcLbH1u

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Remove primarycolorsetup.exe - Powered by Reason Core Security