setup.exe

Search Protect

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application setup.exe by ClientConnect has been detected as adware by 14 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from sp-storage.spccint.com. While running, it connects to the Internet address cms.dmccint.com on port 80 using the HTTP protocol.
Publisher:
Client Connect LTD  (signed by ClientConnect LTD)

Product:
Search Protect

Version:
2.20.0.406

MD5:
aac25b7635df540e250fe702cec8a356

SHA-1:
9ce35e1b27a98129795c8ad5cccf5ff6496f1aec

SHA-256:
ec9863009e0e82cd5cf586d60e056bd31c7427a9d7408e827f30b52e1b8dd92b

Scanner detections:
14 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
4/25/2024 6:24:29 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.SearchProtect.2
749

AVG
Generic
2016.0.3227

Baidu Antivirus
Adware.Win32.Conduit
4.0.3.15117

ESET NOD32
Win32/ClientConnect (variant)
9.11023

Fortinet FortiGate
Riskware/ClientConnect
1/17/2015

K7 AntiVirus
Riskware
13.191.14661

Malwarebytes
PUP.Optional.SearchProtect.A
v2015.01.17.04

McAfee
Artemis!AAC25B7635DF
5600.6883

MicroWorld eScan
Gen:Variant.Application.SearchProtect.2
16.0.0.51

Qihoo 360 Security
HEUR/QVM42.0.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.Conduit
15.1.17.4

Sophos
Conduit Search Protect
4.98

Trend Micro House Call
Suspici.D88B743E
7.2.17

VIPRE Antivirus
Conduit
36702

File size:
7.9 MB (8,279,912 bytes)

Product version:
2.20.0.406

Copyright:
© 2014 ClientConnect Ltd.

Original file name:
SearchProtect

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\content.ie5\gjg52m9l\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
12/31/2014 1:00:00 AM

Valid to:
12/27/2016 12:59:59 AM

Subject:
CN=ClientConnect LTD, OU=Safe Search, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
354F4C7E49A131A6E4BF89B253C78A2D

File PE Metadata
Compilation timestamp:
7/6/2011 4:31:20 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
196608:6gUDmfinqehYHLCyA0s+b1e81CQpnTvTLKG2iyEWVAVrR:6gUDdnrqH+yAyb1e8EQx3WG2iyEwAVrR

Entry address:
0x354B

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 84, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, B0, 82, 40, 00, 6A, 08, A3, 98, 06, 47, 00, E8, 67, 27, 00, 00, 55, 68, B4, 02, 00, 00, A3, B0, 05, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 86, 40, 00, FF, 15, 80, 81, 40, 00, 68, 04, 86, 40, 00, 68, A0, 85, 46, 00, E8, 35, 26, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 10, 4C, 00, 57, E8, 23, 26, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
25 KB (25,600 bytes)

The file setup.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cms.dmccint.com  (23.67.242.80:80)

 
http://cms.dmccint.com/DynamicOffer/16365637/16386760/?mainofferId=16362203&CurrentStep=2&TotalSteps=4&DownloadBrowser=IE&CType=-1&UserMode=-1&DMVersion=1.3.6.63.16385626.01&Language=US-EN

Remove setup.exe - Powered by Reason Core Security