setup.exe

Scan Tack

This is the installer and setup program from the Scan Tack branded Yontoo adware web browser extension. This adware injects various forms of advertisements in the user's web browser based on the HTML content and URLs viewed. Ad include banners, in-line context text links, coupons, and search. The program will install an auto-updating background service that will update the software with additional features. The application setup.exe by Scan Tack has been detected as adware by 20 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Scan Tack  (signed and verified)

MD5:
10ae8b6ed0edc8f00a75eccd7c3cc1f9

SHA-1:
45fb980a3f145c17a45be5af7862b2db26f7d085

SHA-256:
2c845d8543e3981f3b9a2b8574b7b0c9bcefe41209aad5c9f753bd5a3de5ff63

Scanner detections:
20 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/25/2024 3:33:42 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.Y
458

Agnitum Outpost
Riskware.Agent
7.1.1

AVG
BrowseFox
2016.0.2936

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15114

Bitdefender
Adware.SwiftBrowse.Y
1.0.20.1540

Dr.Web
Trojan.BPlug.90
9.0.1.0308

Emsisoft Anti-Malware
Adware.SwiftBrowse.Y
8.15.11.04.12

ESET NOD32
Win32/BrowseFox (variant)
9.9994

Fortinet FortiGate
Riskware/BrowseFox
11/4/2015

F-Secure
Adware.SwiftBrowse.Y
11.2015-04-11_4

Malwarebytes
PUP.Optional.ScanTack.A
v2015.11.04.12

McAfee
Artemis!10AE8B6ED0ED
5600.6592

MicroWorld eScan
Adware.SwiftBrowse.Y
16.0.0.924

nProtect
Adware.SwiftBrowse.Y
14.06.24.01

Reason Heuristics
PUP.Yontoo.ScanTack.Installer (M)
15.11.4.0

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.151102

Sophos
Generic PUA NE
4.98

SUPERAntiSpyware
Adware.BrowseFox/Variant
9529

Trend Micro House Call
Suspicious_GEN.F47V0615
7.2.308

VIPRE Antivirus
Yontoo
30620

File size:
2 MB (2,109,256 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\content.ie5\6lhstjpk\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/22/2014 1:00:00 AM

Valid to:
1/23/2015 12:59:59 AM

Subject:
CN=Scan Tack, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Scan Tack, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
44D91A3142283CE62B23F23C84838B0D

File PE Metadata
Compilation timestamp:
12/5/2009 11:52:01 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
49152:EXxwt8Gqez0gSXt0ZF/lGCPNKrDPPseDgAtXq4QZ1nMq6m8:EXxtGlz05SFlNKrDPseDgdPZdMLX

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9974

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Remove setup.exe - Powered by Reason Core Security