wssetup.exe

Perion Network Ltd.

The application wssetup.exe by Perion Network has been detected as a potentially unwanted program by 15 anti-malware scanners. The program is a setup application that uses the Perion Download Manager installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from www5l.incredimail.com. While running, it connects to the Internet address ude.databssint.com on port 80 using the HTTP protocol.
Publisher:
Perion Network Ltd.  (signed and verified)

Version:
5.1.5.4

MD5:
c09af90335088e71571ce054b8dfb714

SHA-1:
b0058db13e2145434b4bed61b2f4beb8fd4f28cd

SHA-256:
1847a1f49d7c01cb719a30ecc4ffce360856fc1b684a888a9894a6ab9276f146

Scanner detections:
15 / 68

Status:
Potentially unwanted

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/19/2024 12:39:34 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
Adware/Agent.4748456
7.11.200.132

Baidu Antivirus
Adware.Win32.Perinet
4.0.3.15116

Dr.Web
Adware.SweetIM.28
9.0.1.016

ESET NOD32
Win32/Toolbar.Perion (variant)
9.10999

Fortinet FortiGate
Riskware/Perinet
1/16/2015

G Data
Win32.Application.Iminent
15.1.24

K7 AntiVirus
Unwanted-Program
13.191.14611

Kaspersky
not-a-virus:WebToolbar.Win32.Perinet
14.0.0.2630

McAfee
Artemis!C09AF9033508
5600.6883

NANO AntiVirus
Trojan.Nsis.Toolbar.dflenu
0.30.0.64448

Qihoo 360 Security
Win32/Virus.WebToolbar.2ea
1.0.0.1015

Reason Heuristics
PUP.Perion.Installer
15.1.16.23

Sophos
Generic PUA JM
4.98

Trend Micro House Call
Suspicious_GEN.F47V0106
7.2.16

VIPRE Antivirus
Sweetpacks/SweetIM
36584

File size:
4.5 MB (4,748,456 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Perion Download Manager (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\Windows\System32\config\systemprofile\appdata\local\microsoft\windows\temporary internet files\content.ie5\wssetup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/23/2012 8:00:00 PM

Valid to:
4/23/2015 7:59:59 PM

Subject:
CN=Perion Network Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Perion Network Ltd., L=Tel Aviv, S=Tel Aviv, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
45F87694FE8D1984719796AEC8031DF4

File PE Metadata
Compilation timestamp:
12/5/2009 5:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:VFBhPAZkvm4K4OhY6ofZwg4yCGDWwa2RIP56Nu8aThoc0B25wOLyfNbX2aXwLt:bfqkej4OhYpBwTMWwa2G5kuhTh8JCy7G

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9963

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file wssetup.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ude.databssint.com  (107.22.223.150:80)

TCP (HTTP):
Connects to storage.stgbssint.com  (172.229.236.170:80)

Remove wssetup.exe - Powered by Reason Core Security