setup.exe

Smart Applications

This is the installer and setup program from the Smart Applications branded Yontoo adware web browser extension. This adware injects various forms of advertisements in the user's web browser based on the HTML content and URLs viewed. Ad include banners, in-line context text links, coupons, and search. The program will install an auto-updating background service that will update the software with additional features. The application setup.exe by Smart Applications has been detected as adware by 13 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer.
Publisher:
Smart Applications  (signed and verified)

MD5:
b3a33d1962c73713338b51017ad6f9d8

SHA-1:
c6789f8988f361382b7a48255e9e3cf345b640a9

SHA-256:
0fce31396baaea51c55c8b132d6e33c8445de4860a1f93914849a8a7dfaa2945

Scanner detections:
13 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
4/24/2024 12:42:28 PM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
Adware.Win32.PullUpdate
4.0.3.15525

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Adware.Yontoo.68
9.0.1.0145

ESET NOD32
MSIL/Adware.PullUpdate.J.gen (variant)
9.11648

Fortinet FortiGate
Adware/PullUpdate
5/25/2015

K7 AntiVirus
Adware
13.204.15951

Malwarebytes
PUP.Optional.FastBrowser.A
v2015.05.25.09

McAfee
Artemis!B3A33D1962C7
5600.6754

NANO AntiVirus
Riskware.Nsis.Yontoo.dqgtsc
0.30.24.1357

Panda Antivirus
PUP/SpeedBrowser
15.05.25.09

Qihoo 360 Security
HEUR/QVM03.0.Malware.Gen
1.0.0.1015

Sophos
Pull Update
4.98

Trend Micro House Call
Suspicious_GEN.F47V0517
7.2.145

File size:
1.4 MB (1,498,248 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/13/2014 6:00:00 PM

Valid to:
11/14/2015 5:59:59 PM

Subject:
CN=Smart Applications, O=Smart Applications, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4CF1C880A6746C7D0CDCB1393793A057

File PE Metadata
Compilation timestamp:
6/6/2009 4:41:59 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:aVGO0T4oimVfzUQHR6lHDXZWeBg4qceh4k+4s2FSNQugk6Ne6ONMegFk71nEt:BB62bYljkZv+52FSa5k6N+NxtE

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9800

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file setup.exe has been seen being distributed by the following 2 URLs.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Remove setup.exe - Powered by Reason Core Security