snow bros. 2 - with new elves - otenki paradise.exe

Spiral Media

The application snow bros. 2 - with new elves - otenki paradise.exe by Spiral Media has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Tomorrow Software Installer installer.
Publisher:
Spiral Media  (signed and verified)

Product:
Spiral Media

Version:
78.6.1.397

MD5:
1241a3bec2620708cc298a90c03fa206

SHA-1:
2581450814527e4a877c5d8cc1a819031e45f9d6

SHA-256:
c8b556f4e80c26df9f9dae994a36f79d6c21ac1a84293d20ac408519c6a64a00

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
5/3/2024 11:24:26 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.TomorrowSoftware (M)
17.3.14.5

File size:
871.1 KB (892,032 bytes)

Product version:
78.6.1.397

Copyright:
Copyright (C) 2015

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tomorrow Software Installer

Language:
English (United States)

Common path:
C:\users\{user}\downloads\snow bros. 2 - with new elves - otenki paradise.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
11/20/2015 7:46:38 PM

Valid to:
10/13/2016 8:17:39 PM

Subject:
CN=Spiral Media, O=Spiral Media, L=San Francisco, S=California, C=US

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
028EC22ABAD314A6

File PE Metadata
Compilation timestamp:
12/20/2014 7:09:33 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x464A

Entry point:
E8, 41, 96, 00, 00, E9, 44, 8F, 00, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 81, EC, 18, 02, 00, 00, 53, 8B, 9C, 24, 20, 02, 00, 00, 55, 56, 57, 8D, 44, 24, 10, 50, 33, FF, 57, 6A, 01, 53, 89, 7C, 24, 20, E8, 7B, 09, 00, 00, 8B, 4C, 24, 20, 8B, F0, 83, C4, 10, 8D, 2C, 0E, 85, F6, 75, 1D, 53, E8, 55, 07, 00, 00, 53, E8, 4F, 07, 00, 00, 83, C4, 08, 8D, 47, 02, 5F, 5E, 5D, 5B, 81, C4, 18, 02, 00, 00, C3, 6A, 02, 53, E8, 26, 06, 00, 00, 8D, 54, 24, 24, 52, 53, E8, DB, 08, 00, 00, 83, C4, 10, 3B, F5...
 
[+]

Code size:
53.5 KB (54,784 bytes)