setup.exe

ColoColo Apps (Bright Circle Investments Ltd)

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application setup.exe by ColoColo Apps (Bright Circle Investments) has been detected as adware by 17 anti-malware scanners. This is a setup and installation application and has been known to bundle potentially unwanted software. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:

MD5:
c37209333b07075e59039b8a6d8e835c

SHA-1:
54b62176bd09ded72fe9306220b2e12a711c3515

SHA-256:
a11ad40ca12c8131a1c900d5913de502a73cb0ecc436ec85d7444077180a1db5

Scanner detections:
17 / 68

Status:
Adware

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage). Distributed through the Brightcircle investments brand.

Analysis date:
4/20/2024 1:40:26 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.173350
734

Avira AntiVirus
ADWARE/CrossRider.Gen4
7.11.206.68

AVG
Win32/DH{gRKBEyAiJQE2ADVO}
2016.0.3212

Baidu Antivirus
PUA.Win32.CrossRider
4.0.3.1521

Bitdefender
Gen:Variant.Adware.Graftor.173350
1.0.20.160

Clam AntiVirus
Win.Adware.Graftor-750
0.98/21511

Comodo Security
Application.Win32.CrossRider.KI
20918

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.173350
8.15.02.01.04

ESET NOD32
Win32/Toolbar.CrossRider.BX potentially unwanted (variant)
9.11104

F-Secure
Gen:Variant.Adware.Graftor.173350
11.2015-01-02_1

G Data
Gen:Variant.Adware.Graftor.173350
15.2.25

Kaspersky
not-a-virus:WebToolbar.Win32.CrossRider
14.0.0.2554

MicroWorld eScan
Gen:Variant.Adware.Graftor.173350
16.0.0.96

Panda Antivirus
Trj/CI.A
15.02.01.04

Qihoo 360 Security
Win32/Virus.Adware.de5
1.0.0.1015

Reason Heuristics
Adware.BrightCircle.Installer
15.2.10.11

VIPRE Antivirus
Crossrider
37144

File size:
202.5 KB (207,320 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
12/16/2014 1:00:00 AM

Valid to:
12/17/2015 12:59:59 AM

Subject:
CN=ColoColo Apps (Bright Circle Investments Ltd), O=ColoColo Apps (Bright Circle Investments Ltd), STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Nicosia, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00D815C7CD687694A6F4119A3535D31D7A

File PE Metadata
Compilation timestamp:
1/31/2015 12:07:32 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:Z2KVDpLSBV7+1exZAV5azNh+5eyk36vs1C8/ehoraNUXwXL2pp:ZxV9LIl+1e/hRKvs1C8/ehoraNUXKKpp

Entry address:
0x12944

Entry point:
E8, AD, 6A, 00, 00, E9, 7F, FE, FF, FF, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, 50, 26, 33, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 58, 11, 33, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, 50, 26, 33, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01, 00, 00, F7, C6, 03, 00...
 
[+]

Code size:
152 KB (155,648 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security