setup_42cd63.exe

The application setup_42cd63.exe has been detected as a potentially unwanted program by 11 anti-malware scanners. The file has been seen being downloaded from d24u51ac8ybaqu.cloudfront.net. While running, it connects to the Internet address server-54-230-52-89.jfk6.r.cloudfront.net on port 443.
MD5:
840b1556f272b961e9ddafee6660cdd3

SHA-1:
470b7b101e6853fa823d2167b9439f348375053f

SHA-256:
4a3cab8386b0bd53a955d584fd1116b5394d455575d16bdf923cb1509eb31ea5

Scanner detections:
11 / 68

Status:
Potentially unwanted

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
11/20/2017 5:21:52 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Mikey.28503
430

AhnLab V3 Security
PUP/Win32.CrossRider
2015.12.01

Avira AntiVirus
TR/Taranis.399
8.3.2.4

Arcabit
Trojan.Mikey.D6F57
1.0.0.627

Bitdefender
Gen:Variant.Mikey.28503
1.0.20.1675

Emsisoft Anti-Malware
Gen:Variant.Mikey.28503
8.15.12.01.02

F-Secure
Gen:Variant.Mikey.28503
11.2015-01-12_3

G Data
Gen:Variant.Mikey.28503
15.12.25

Malwarebytes
Trojan.Agent
v2015.12.01.02

MicroWorld eScan
Gen:Variant.Mikey.28503
16.0.0.1005

Qihoo 360 Security
HEUR/QVM08.0.Malware.Gen
1.0.0.1077

File size:
10 KB (10,240 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\setup_42cd63.exe

File PE Metadata
Compilation timestamp:
12/1/2015 6:06:14 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
192:2tnjo+kjsbftPXGU59rHCDQKy7ara6AJEE:ajo+2sT/KyWdAJE

Entry address:
0x1000

Entry point:
6A, 70, 68, 38, 23, 40, 00, E8, F8, 01, 00, 00, 33, DB, 89, 5D, FC, 8D, 45, 80, 50, FF, 15, 00, 20, 40, 00, 83, CF, FF, 89, 7D, FC, 66, 81, 3D, 00, 00, 40, 00, 4D, 5A, 75, 28, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, 17, 0F, B7, 88, 18, 00, 40, 00, 81, F9, 0B, 01, 00, 00, 74, 20, 81, F9, 0B, 02, 00, 00, 74, 05, 89, 5D, E4, EB, 2A, 83, B8, 84, 00, 40, 00, 0E, 76, F2, 33, C9, 39, 98, F8, 00, 40, 00, EB, 11, 83, B8, 74, 00, 40, 00, 0E, 76, DF, 33, C9, 39, 98, E8, 00, 40, 00, 0F, 95, C1...
 
[+]

Entropy:
4.9227

Developed / compiled with:
Microsoft Visual C++ v7.1

Code size:
3 KB (3,072 bytes)

The file setup_42cd63.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to server-54-230-52-89.jfk6.r.cloudfront.net  (54.230.52.89:443)

TCP (HTTP SSL):
Connects to server-54-230-38-186.jfk1.r.cloudfront.net  (54.230.38.186:443)

TCP (HTTP SSL):
Connects to server-54-230-38-177.jfk1.r.cloudfront.net  (54.230.38.177:443)

TCP (HTTP SSL):
Connects to server-54-230-36-204.jfk1.r.cloudfront.net  (54.230.36.204:443)

TCP (HTTP SSL):
Connects to server-54-192-36-126.jfk1.r.cloudfront.net  (54.192.36.126:443)

TCP (HTTP SSL):
Connects to server-204-246-169-90.jfk1.r.cloudfront.net  (204.246.169.90:443)

Remove setup_42cd63.exe - Powered by Reason Core Security