wpsetup.exe

Freemium GmbH

The application wpsetup.exe by Freemium GmbH has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Covus installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from az745087.vo.msecnd.net.
Publisher:
Freemium GmbH  (signed and verified)

MD5:
3f3a30abda5680b4ff0035e827fbe368

SHA-1:
c4dc67bf4fc3d3dfb64986093184bf46b1584d76

SHA-256:
138f3bf68dbb18a0153585e3ceb47a23c7dde3e78568ee237f893c82c65a61ca

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
10/31/2024 10:58:37 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Covus (M)
16.8.7.14

File size:
518.8 KB (531,216 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Covus

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\wpsetup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/6/2016 2:00:00 AM

Valid to:
4/13/2017 1:59:59 AM

Subject:
CN=Freemium GmbH, O=Freemium GmbH, STREET=Schwedter Straße 9a, L=Berlin, S=Berlin, PostalCode=10119, C=DE

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00BCEDCE129E9AA236BBF4BC059A58BA55

File PE Metadata
Compilation timestamp:
7/5/2016 6:01:47 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:YaKSqUD27cNs8IYUfLhd9hJZtGfBhEr21lqtMfEdxTgzn:1qH7Cs8IniU2itWEdW

Entry address:
0x1382C

Entry point:
E8, 14, 7B, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 40, 35, 45, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, C0, 31, 45, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 98, 72, 47, 00, 89, 0D, 94, 72, 47, 00, 89, 15, 90, 72, 47, 00, 89, 1D, 8C, 72, 47, 00, 89, 35, 88, 72, 47, 00, 89, 3D...
 
[+]

Code size:
328 KB (335,872 bytes)

The file wpsetup.exe has been seen being distributed by the following URL.

Remove wpsetup.exe - Powered by Reason Core Security