setup.exe

Jotzey

This is the installer and setup program from the Jotzey branded Yontoo adware web browser extension. This adware injects various forms of advertisements in the user's web browser based on the HTML content and URLs viewed. Ad include banners, in-line context text links, coupons, and search. The program will install an auto-updating background service that will update the software with additional features. The application setup.exe by Jotzey has been detected as adware by 12 anti-malware scanners. This is a setup and installation application and has been known to bundle potentially unwanted software. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Jotzey  (signed and verified)

MD5:
8fcae43c8c8cfe1e35470ae7a59303e7

SHA-1:
641e8927116974958e1c3b386bc5a3055307707a

SHA-256:
7ddbefe5c5daf86f6490c74b34fc6c71353bc42a6c876a470d2334bc7d8003a9

Scanner detections:
12 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/4/2024 10:46:53 PM UTC  (today)

Scan engine
Detection
Engine version

Comodo Security
Application.Win32.Altbrowse.AK
17816

ESET NOD32
Win32/BrowseFox
8.9446

Fortinet FortiGate
Riskware/BrowseFox
3/3/2014

IKARUS anti.virus
not-a-virus:AdWare.Win32.Agent
t3scan.2.2.29

Kaspersky
not-a-virus:AdWare.Win32.Agent
14.0.0.4226

Malwarebytes
PUP.Optional.Jotzey.A
v2014.03.03.06

NANO AntiVirus
Riskware.Win32.Agent.csjwev
0.28.0.57630

Reason Heuristics
PUP.Installer.Jotzey.F
14.3.3.18

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.14301

Sophos
Generic PUA PI
4.97

Trend Micro House Call
TROJ_GEN.F47V0216
7.2.62

VIPRE Antivirus
Adware.Agent
26652

File size:
2.1 MB (2,166,392 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/12/2014 1:00:00 AM

Valid to:
1/13/2015 12:59:59 AM

Subject:
CN=Jotzey, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jotzey, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4C7B335D1F24250859B4B5C0085A062C

File PE Metadata
Compilation timestamp:
12/5/2009 11:52:01 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
49152:8WF8A4AdRiOYRez0grNzq4rXTVWeK3AatEIYWl8oo:8WuA4WR/jz0ETgePat8WOD

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Code size:
22.5 KB (23,040 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Remove setup.exe - Powered by Reason Core Security