setup.exe

Super Click Media

The application setup.exe by Super Click Media has been detected as a potentially unwanted program by 26 anti-malware scanners. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. The file has been seen being downloaded from files4.downloadnet1194.com.
Publisher:
Super Click Media  (signed and verified)

Product:
Super Click Media

Version:
20.5.0.143

MD5:
97976456d4acde3d76c13f0bb1a78ab8

SHA-1:
0eed466321e58460dbe58e0245f6aa839d54d31d

SHA-256:
a7d930b4e8f12d3d08ba1e17a5293b0e79bd4aa83ea4030bd4f75d76d5a7c95d

Scanner detections:
26 / 68

Status:
Potentially unwanted

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Analysis date:
4/24/2024 9:12:36 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.DownloadAdmin.4
376

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
TR/Dropper.Gen
7.11.30.172

avast!
Win32:Malware-gen
2014.9-160124

AVG
Generic
2017.0.2854

Baidu Antivirus
PUA.Win32.DownloadAdmin
4.0.3.16124

Bitdefender
Gen:Variant.Application.Bundler.DownloadAdmin.4
1.0.20.120

Clam AntiVirus
Win.Trojan.Downloadadmin-265
0.98/21170

Dr.Web
Trojan.Vittalia.1522
9.0.1.024

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.DownloadAdmin
8.16.01.24.06

ESET NOD32
Win32/DownloadAdmin.P potentially unwanted application
10.7.0.302.0

Fortinet FortiGate
Riskware/DownloadAdmin
1/24/2016

F-Secure
Gen:Variant.Application.Bundler
11.2016-24-01_1

G Data
Gen:Variant.Application.Bundler.DownloadAdmin
16.1.25

IKARUS anti.virus
PUA.DownloadAdmin
t3scan.1.9.5.0

K7 AntiVirus
Adware
13.212.18068

Malwarebytes
PUP.Optional.SuperClickMedia
v2016.01.24.06

McAfee
Artemis!97C7645D2363
5600.6510

MicroWorld eScan
Gen:Variant.Application.Bundler.DownloadAdmin.4
17.0.0.72

NANO AntiVirus
Trojan.Win32.Vittalia.dzftjm
1.0.10.5081

Norman
Gen:Variant.Application.Bundler.DownloadAdmin.4
11.20160124

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1077

Reason Heuristics
PUP.DownloadAdmin.SuperClickMedia.Installer (M)
16.1.24.18

Rising Antivirus
PE:Adware.DownloadAdmin!1.A243 [F]
23.00.65.16122

VIPRE Antivirus
Trojan.Win32.Generic
45740

Zillya! Antivirus
Adware.BrowseFox.Win32.231004
2.0.0.2561

File size:
874.2 KB (895,224 bytes)

Product version:
20.5.0.143

Copyright:
Copyright (C) 2015

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\setup.exe

Digital Signature
Authority:
GoDaddy.com, Inc.

Valid from:
11/7/2015 6:05:38 AM

Valid to:
11/7/2016 6:05:38 AM

Subject:
CN=Super Click Media, O=Super Click Media, L=Oakland, S=California, C=US

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
4BF2519C9735FB4D

File PE Metadata
Compilation timestamp:
1/2/2015 4:21:07 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:RiuVTdMwFIA/mcXa4ZVPX3JEwMmB4RP8+V0iDpO:7tdpjXa4PPKC45HQ

Entry address:
0x3973

Entry point:
E8, E8, A4, 00, 00, E9, 07, 9D, 00, 00, CC, CC, CC, 53, 55, 56, 57, 8B, 7C, 24, 14, 33, F6, 85, FF, 7E, 27, 8B, 5C, 24, 18, 8B, 2D, 6C, F0, 40, 00, EB, 06, 8D, 9B, 00, 00, 00, 00, A1, 08, 36, 41, 00, 8B, 0C, B3, 50, 51, FF, D5, 85, C0, 74, 3D, 46, 3B, F7, 7C, EB, 8B, 15, C0, 35, 41, 00, A1, 78, 37, 41, 00, 8B, 0D, 48, 37, 41, 00, 52, 50, 51, 8D, 54, 24, 20, 52, C7, 44, 24, 24, FF, FF, FF, FF, E8, F5, 1D, 00, 00, 83, C4, 10, 85, C0, 75, 0B, 8B, 44, 24, 14, 50, FF, 15, 18, F1, 40, 00, 5F, 5E, 5D, 5B, C3, CC...
 
[+]

Entropy:
7.9675  (probably packed)

Code size:
54 KB (55,296 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security