us_3um+w.exe

Maxthon Cloud Browser

Sevas-S LLC

The file us_3um+w.exe by Sevas-S has been detected as adware by 13 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from maxthon.downloadable.co and multiple other hosts.
Publisher:
Sevas-S LLC  (signed and verified)

Product:
Maxthon Cloud Browser

Version:
1.0.0.0

MD5:
4cdcc069b6e0a893e357d70d53595f23

SHA-1:
08121971c5eb91d470732527f361e48d5811dbd3

SHA-256:
9539ef66397b1756f7b098716d117a14afb8770d4fda11c572c07c3d5aabc176

Scanner detections:
13 / 68

Status:
Adware

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
5/21/2024 7:46:57 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
APPL/Downloader.Gen
7.11.182.236

AVG
AdLoad.OpenCandy
2015.0.3288

Baidu Antivirus
Adware.Win32.OpenCandy
4.0.3.141117

Dr.Web
Adware.Downware.8467
9.0.1.0321

ESET NOD32
Win32/JoyDownloader
8.10664

G Data
Win32.Adware.OpenCandy
14.11.24

K7 AntiVirus
Unwanted-Program
13.185.13888

Malwarebytes
PUP.Optional.OpenCandy
v2014.11.17.10

McAfee
Artemis!4CDCC069B6E0
5600.6944

Reason Heuristics
PUP.SevasS.M
14.11.17.10

Trend Micro House Call
Suspicious_GEN.F47V1026
7.2.321

VIPRE Antivirus
Sevas-S Installer
34480

File size:
493.3 KB (505,184 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\us_3um+w.exe.part

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/23/2014 2:00:00 AM

Valid to:
3/26/2015 1:59:59 AM

Subject:
CN=Sevas-S LLC, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Sevas-S LLC, L=Kyiv, S=Kyivska oblast, C=UA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4B35AC223F4DB03D3B4C5368983A4B53

File PE Metadata
Compilation timestamp:
5/20/2013 2:53:11 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:DKc5xbAT5hFcdQtcxlHcG1ib3ncxixN/D6:VPYvKmIHcSibsx6W

Entry address:
0x333E

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, 30, A2, 40, 00, 89, 6C, 24, 14, FF, 15, 34, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, BC, 80, 40, 00, 55, FF, 15, AC, 82, 40, 00, 6A, 08, A3, 78, 4F, 43, 00, E8, A8, 2E, 00, 00, A3, C4, 4E, 43, 00, 55, 8D, 44, 24, 34, 68, B4, 02, 00, 00, 50, 55, 68, F0, B1, 42, 00, FF, 15, 7C, 81, 40, 00, 68, 7C, A3, 40, 00, 68, C0, 3E, 43, 00, E8, 13, 2B, 00, 00, FF, 15, 34, 81, 40, 00, BB, 00, F0, 43, 00, 50, 53, E8, 01, 2B, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
24.5 KB (25,088 bytes)

The file us_3um+w.exe has been seen being distributed by the following 2 URLs.

Remove us_3um+w.exe - Powered by Reason Core Security