saveas.exe

WoW Software

Moshe Karaso

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions using the JustPlug.it browser framework. The application saveas.exe by Moshe Karaso has been detected as adware by 27 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
WoW Worldwide Software LTD  (signed by Moshe Karaso)

Product:
WoW Software

Description:
Installer

Version:
2012.12.31.1118

MD5:
b2194a0a7859f47b5ca233ace05801be

SHA-1:
cd749f7aa82170688f447eb058ba48dee5f081c6

SHA-256:
23ffcb8eb2f0279996484f24e3d3020c0e1250e05496b99d5e1e4116a62b38da

Scanner detections:
27 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/25/2024 5:37:12 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Trojan.Rogue
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2014.06.14

Avira AntiVirus
TR/Rogue.8544644
7.11.146.188

avast!
Win32:Downloader-TRK [Adw]
141214-1

AVG
MalSign.Skodna.Bundle
2015.0.3254

Bkav FE
HW32.CDB
1.3.0.4959

Clam AntiVirus
Win.Trojan.Installerex-174
0.98/19817

Comodo Security
Application.Win32.InstalleRex.KG
18196

Dr.Web
Adware.Downware.771
9.0.1.05190

ESET NOD32
Win32/InstalleRex.E potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
Riskware/InstalleRex
12/21/2014

F-Prot
W32/InstallRex.B
4.6.5.141

G Data
Win32.Application.InstalleRex
14.12.24

IKARUS anti.virus
PUP.InstallRex
t3scan.1.6.1.0

K7 AntiVirus
Trojan
13.180.12657

NANO AntiVirus
Riskware.Win32.Downware.ctkpkw
0.28.0.59608

nProtect
Trojan/W32.StartPage.306192
14.04.30.01

Panda Antivirus
PUP/TSUploader
14.12.21.11

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.MosheKaraso.G
14.12.21.11

Rising Antivirus
PE:PUF.InstallRex!1.9E4C
23.00.65.141219

Sophos
PUA 'InstallRex'
5.09

SUPERAntiSpyware
PUP.InstallerEx/Variant
10164

Trend Micro House Call
HV_INSTALLEREX_CI195298.RDXN
7.2.355

Vba32 AntiVirus
Downloader.AdLoad
3.12.26.0

VIPRE Antivirus
Installerex/WebPick
28752

Zillya! Antivirus
Downloader.Adload.Win32.16959
2.0.0.1774

File size:
300.5 KB (307,760 bytes)

Product version:
1.0

Copyright:
Copyright © 2012 WoW Worldwide Software LTD

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\saveas.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
11/14/2012 4:00:00 PM

Valid to:
11/15/2013 3:59:59 PM

Subject:
CN=Moshe Karaso, O=Moshe Karaso, STREET=Nahum 19, L=Ramat Gan, S=center, PostalCode=52233, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
55036D3C9B5C690240A409061736347F

File PE Metadata
Compilation timestamp:
11/29/2012 5:03:49 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:VrnmlRH9Oy6tq6JczwsIiPG2ZM8p3ABMLbl9MFJXgyPzl3zCCoK7f:VrnaRH9Oy6tNJ4wsf1pwylsJXrM9C

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9618

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file saveas.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

TCP (HTTP):
Connects to c1.stylezip.info  (54.186.255.26:80)

 
http://c1.stylezip.info/?step_id=1&installer_id=15298316&publisher_id=529&source_id=0&page_id=0&country_code=US&locale=US&browser_id=4&download_id=45894948&external_id=0&session_id=91789896&hardware_id=107088212&installer_file_name=saveas

Remove saveas.exe - Powered by Reason Core Security