setup.exe

Smart Applications

This is the installer and setup program from the Smart Applications branded Yontoo adware web browser extension. This adware injects various forms of advertisements in the user's web browser based on the HTML content and URLs viewed. Ad include banners, in-line context text links, coupons, and search. The program will install an auto-updating background service that will update the software with additional features. The application setup.exe by Smart Applications has been detected as adware by 14 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer.
Publisher:
Smart Applications  (signed and verified)

MD5:
ee611267b719a356803ed2a2e31aa7ac

SHA-1:
764ab9588f486f2a4cc3edaac1b31a06ab31d8a0

SHA-256:
39fbe02ed32ebc72c53ca74f71abe177f3861439430fff50b9cc59c9c90744db

Scanner detections:
14 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
4/29/2024 1:48:28 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.PullUpdate
7.1.1

Avira AntiVirus
ADWARE/Adware.Gen7
3.6.1.96

Comodo Security
ApplicUnwnt
21595

Dr.Web
Adware.Yontoo.68
9.0.1.0337

ESET NOD32
MSIL/Adware.PullUpdate.J.gen (variant)
9.11401

Fortinet FortiGate
Adware/PullUpdate
12/3/2015

K7 AntiVirus
Adware
13.202.15430

Malwarebytes
PUP.Optional.FastBrowser.A
v2015.12.03.07

McAfee
Artemis!EE611267B719
5600.6563

Qihoo 360 Security
HEUR/QVM03.0.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Yontoo.SmartApplications.Installer (M)
15.12.3.7

Sophos
Pull Update
4.98

Trend Micro House Call
Suspicious_GEN.F47V0313
7.2.337

VIPRE Antivirus
Trojan.Win32.Generic
38918

File size:
1.4 MB (1,498,272 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/13/2014 7:00:00 PM

Valid to:
11/14/2015 6:59:59 PM

Subject:
CN=Smart Applications, O=Smart Applications, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4CF1C880A6746C7D0CDCB1393793A057

File PE Metadata
Compilation timestamp:
6/6/2009 5:41:59 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:x9F804ERTyQAukyj9WwGU3Ml3doJuZMhoupzugk6Ne6ONMegFk71nEJ:BwRxwWltX6dpz5k6N+Nxt6

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9802

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file setup.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Remove setup.exe - Powered by Reason Core Security