setup_ca_20131219.exe

Creative Island Media, LLC

The software will display additional offers (such as adware) during installation including a browser toolbar/extension as well as advertising injection software (part of the Injekt brand). The application setup_ca_20131219.exe by Creative Island Media has been detected as adware by 17 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from d3emsmln8xfj03.cloudfront.net. While running, it connects to the Internet address update.betterxperience.com on port 80 using the HTTP protocol.
Publisher:
Creative Island Media, LLC  (signed and verified)

MD5:
616dc9365af46d19c8b9a1bd0b62c826

SHA-1:
83a5c75e34dbb2172c64af1574edfa90f3defc01

SHA-256:
201fa82b5885687e1253a22ee707cabb377de0094123a180b8449b0bc38dfdb3

Scanner detections:
17 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/26/2024 5:39:25 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.Agent.NVF
913

avast!
Win32:BHO-AMO [PUP]
2014.9-140805

Bitdefender
Adware.Agent.NVF
1.0.20.1085

Dr.Web
Adware.Plugin.128
9.0.1.0217

Emsisoft Anti-Malware
Adware.Agent.NVF
8.14.08.05.02

ESET NOD32
Win32/ExFriendAlert (variant)
8.9442

Fortinet FortiGate
Riskware/ExFriendAlert
8/5/2014

F-Secure
Adware.Agent.NVF
11.2014-05-08_3

G Data
Adware.Agent.NVF
14.8.24

IKARUS anti.virus
AdWare.Agent
t3scan.2.2.29

McAfee
Artemis!71B03CAD3F92
5600.7047

MicroWorld eScan
Adware.Agent.NVF
15.0.0.651

nProtect
Adware.Agent.NVF
14.02.19.01

Reason Heuristics
PUP.Installer.CreativeIslandMedia.R
14.8.7.20

Sophos
Search Donkey
4.97

Trend Micro House Call
TROJ_GEN.F47V1229
7.2.217

VIPRE Antivirus
SearchDonkey
26628

File size:
3.7 MB (3,885,200 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\setup_ca_20131219.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/20/2013 8:00:00 PM

Valid to:
5/21/2014 7:59:59 PM

Subject:
CN="Creative Island Media, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Creative Island Media, LLC", L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
68F23F4D2767F6491DEA9186F2E5CB89

File PE Metadata
Compilation timestamp:
6/6/2009 5:41:59 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
49152:h/gnmRZu0X7m0e+qHA1mXCSmFwiWHA8Q2onu31Ea7L4OwpnlrEiKKlODN5eB/dnb:hEwZu0XjC2nwynu3nIdllrEiyZ50/MKF

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file setup_ca_20131219.exe has been seen being distributed by the following URL.

http://d3emsmln8xfj03.cloudfront.net/bundles/.../Setup_CA_20131219.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.betterxperience.com  (54.218.62.24:80)

TCP (HTTP):
Connects to d.pullupdate.com  (54.230.15.37:80)

Remove setup_ca_20131219.exe - Powered by Reason Core Security