webcam_7_v1.3.6.0.exe

1.3.9.0.140504.01

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application webcam_7_v1.3.6.0.exe by ClientConnect has been detected as adware by 19 anti-malware scanners. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software. The file has been seen being downloaded from www.afterdawn.com. While running, it connects to the Internet address cms.dmccint.com on port 80 using the HTTP protocol.
Publisher:
ClientConnect LTD  (signed and verified)

Product:
1.3.9.0.140504.01

Description:
Setup.exe

Version:
1.3.9.0

MD5:
57ab6f942fd07681272f3b89f0c59dad

SHA-1:
d1ffd88e484322ef1340846e497395c92876ece8

SHA-256:
be55570d5085f13f6b037752fd80495ef109a5c5ea6eac030af2f7699542a11d

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
4/25/2024 12:28:21 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Toolbar.Conduit
7.1.1

avast!
Win32:Adware-BRM [PUP]
2014.9-150429

AVG
Generic
2016.0.3124

Baidu Antivirus
Adware.Win32.Toolbar
4.0.3.15429

Dr.Web
Adware.Conduit.96
9.0.1.0119

ESET NOD32
Win32/ClientConnect (variant)
9.10176

Fortinet FortiGate
Riskware/Toolbar_Conduit
4/29/2015

G Data
Win32.Application.Conduit
15.4.24

herdProtect (fuzzy)
2015.7.29.22

K7 AntiVirus
Trojan
13.181.12872

Kaspersky
not-a-virus:WebToolbar.Win32.Agent
14.0.0.2116

Malwarebytes
PUP.Optional.Conduit.A
v2015.04.29.09

McAfee
Trojan.Artemis!57AB6F942FD0
16.8.708.2

NANO AntiVirus
Riskware.Win32.Conduit.dbqqxi
0.28.2.61148

Panda Antivirus
Trj/Chgt.D
15.04.29.09

Reason Heuristics
PUP.Conduit.Installer
15.4.29.21

Total Defense
Win32/Tnega.ALHeNWC
37.0.11089

Trend Micro House Call
Suspicious_GEN.F47V0914
7.2.119

VIPRE Antivirus
Conduit
31750

File size:
207.4 KB (212,336 bytes)

Product version:
1.3.9.0

Copyright:
© 2014 ClientConnect Ltd.

Original file name:
webcam_7_v1.3.6.0.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\webcam_7_v1.3.6.0.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/4/2014 2:00:00 AM

Valid to:
2/6/2016 1:59:59 AM

Subject:
CN=ClientConnect LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=DM4, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
201C61613E36EF7DD163280196CD80F7

File PE Metadata
Compilation timestamp:
6/9/2012 4:19:49 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:wz+92mhAMJ/cPl3iwbTozlx/LVXHSPF0Mfh:wK2mhAMJ/cPltU7VXI

Entry address:
0xAC87

Entry point:
E8, E3, FE, FF, FF, 33, C0, 50, 50, 50, 50, E8, 9F, 30, 00, 00, C3, 56, 57, 8B, 7C, 24, 0C, 8B, F1, 8B, CF, 89, 3E, E8, 8F, AB, FF, FF, 89, 46, 08, 89, 56, 0C, 8B, 87, 24, 0C, 00, 00, 89, 46, 10, 5F, 8B, C6, 5E, C2, 04, 00, 8B, C1, 8B, 08, 8B, 50, 10, 3B, 91, 24, 0C, 00, 00, 75, 0D, 6A, 00, FF, 70, 0C, FF, 70, 08, E8, 0E, B1, FF, FF, C3, 56, 8B, F1, 8B, 06, 85, C0, 74, 07, 50, FF, 15, C4, 40, 41, 00, 83, 26, 00, 83, 66, 08, 00, 83, 66, 0C, 00, 5E, C3, 56, 8B, F1, 80, 7E, 04, 00, 75, 34, 68, F4, 44, 41, 00...
 
[+]

Code size:
73 KB (74,752 bytes)

The file webcam_7_v1.3.6.0.exe has been seen being distributed by the following URL.

http://www.afterdawn.com/software/.../download.cfm?version_id=87012&software_id=2620&mirror_id=0&installer=1&perion=1

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cms.dmccint.com  (23.67.242.80:80)

 
http://cms.dmccint.com/DynamicOffer/20880131/20901254/?mainofferId=20876697&CurrentStep=2&TotalSteps=4&DownloadBrowser=IE&CType=-1&UserMode=-1&DMVersion=1.3.0.09.20900120.01&Language=US-EN

Remove webcam_7_v1.3.6.0.exe - Powered by Reason Core Security