wssetup.exe

Perion Network Ltd.

The application wssetup.exe by Perion Network has been detected as a potentially unwanted program by 10 anti-malware scanners. The program is a setup application that uses the Perion Download Manager installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from www5l.incredimail.com. While running, it connects to the Internet address ude.databssint.com on port 80 using the HTTP protocol.
Publisher:
Perion Network Ltd.  (signed and verified)

Version:
5.0.3.5

MD5:
e093c831ca3e8b14c3c0a0d1332ffda8

SHA-1:
5231f5fe9c8de774e535131b790feda46a028932

SHA-256:
00221fd4114b10371452a29b5dbaf3322f965d53110e8b2b5ab1e3f9b2cc7b57

Scanner detections:
10 / 68

Status:
Potentially unwanted

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/23/2024 1:02:13 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Toolbar.Perion
7.1.1

Dr.Web
Adware.SweetIM.28
9.0.1.0105

ESET NOD32
Win32/Toolbar.Perion (variant)
8.9666

Fortinet FortiGate
Riskware/Perion
4/15/2014

K7 AntiVirus
Unwanted-Program
13.176.11737

Kaspersky
not-a-virus:WebToolbar.Win32.Perion
14.0.0.4011

Reason Heuristics
PUP.Perion.Installer.H
14.4.15.18

Sophos
Generic PUA II
4.98

Trend Micro House Call
TROJ_GEN.F47V0206
7.2.105

VIPRE Antivirus
Sweetpacks/SweetIM
28194

File size:
3.8 MB (3,981,184 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Perion Download Manager (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\Windows\System32\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\wssetup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/23/2012 6:00:00 PM

Valid to:
4/23/2015 5:59:59 PM

Subject:
CN=Perion Network Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Perion Network Ltd., L=Tel Aviv, S=Tel Aviv, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
45F87694FE8D1984719796AEC8031DF4

File PE Metadata
Compilation timestamp:
12/5/2009 4:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:y/r1SkZAMQc+hfZwg4yCG1QxBVgZTOvhh9Thoc0B25wOLyfNbXOP5jR:yT1Sk24OBwT8LSJbTh8JCyIpR

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9965

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file wssetup.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ude.databssint.com  (107.22.223.150:80)

TCP (HTTP):
Connects to storage.stgbssint.com  (172.229.236.170:80)

Remove wssetup.exe - Powered by Reason Core Security