wwfraw__2347_il115396.exe

The application wwfraw__2347_il115396.exe has been detected as a potentially unwanted program by 21 anti-malware scanners. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. While running, it connects to the Internet address server-54-240-162-181.fra6.r.cloudfront.net on port 80 using the HTTP protocol.
Version:
1.1.5.26

MD5:
b49966cd493fe3e8681a9c199b81130a

SHA-1:
bca3990ddabc5cf529ce5c7135679b32aa2a7209

SHA-256:
8d7f0c9228acf7a9d37ea1c9f336bfcb64654114ac8de71b847bf48daa12ec39

Scanner detections:
21 / 68

Status:
Potentially unwanted

Analysis date:
4/16/2024 12:04:14 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetiz
2014.09.30

Avira AntiVirus
Adware/Amonetize.tzv
7.11.173.140

avast!
Win32:PUP-gen [PUP]
2014.9-141001

AVG
Adware Generic_r.TX
2014.0.4025

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.14101

Dr.Web
Adware.Downware.8618
9.0.1.05190

ESET NOD32
Win32/Amonetize.BR (variant)
8.10448

Fortinet FortiGate
Adware/Amonetize
10/1/2014

G Data
Win32.Application.Amonetize
14.10.24

K7 AntiVirus
Unwanted-Program
13.183.13432

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.3170

Malwarebytes
PUP.Optional.Amonetize
v2014.10.01.02

McAfee
PUP-FQT
5600.6991

NANO AntiVirus
Riskware.Win32.Amonetize.dfqjlr
0.28.2.62440

Panda Antivirus
Trj/Chgt.G
14.10.01.02

Qihoo 360 Security
Win32/Virus.Adware.e09
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.10.1.2

Sophos
Generic PUA MI
4.98

Trend Micro House Call
TROJ_GEN.R0C1H07IT14
7.2.274

Zillya! Antivirus
Adware.Amonetize.Win32.1273
2.0.0.1938

File size:
378.5 KB (387,584 bytes)

Product version:
1.1.5.26

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\programs\wwfraw__2347_il115396.exe

File PE Metadata
Compilation timestamp:
9/17/2014 12:22:23 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:zZ2KRA+AqItby06N9DejUmbKdxjjg8ESkbQFGD029VAOKohiw8l14zf/tIM4XNBG:/RASmmZVejUWKLjjg8EcFL29VAOKohLN

Entry address:
0x14CC0

Entry point:
E8, 53, 6A, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 3D, 44, 5E, 3C, 00, 00, 75, 18, E8, D1, 60, 00, 00, 6A, 1E, E8, 1B, 5F, 00, 00, 68, FF, 00, 00, 00, E8, B6, F4, FF, FF, 59, 59, 8B, 45, 08, 85, C0, 75, 01, 40, 50, 6A, 00, FF, 35, 44, 5E, 3C, 00, FF, 15, 58, D1, 3B, 00, 5D, C3, 8B, FF, 55, 8B, EC, 53, 8B, 5D, 08, 83, FB, E0, 77, 6F, 56, 57, 83, 3D, 44, 5E, 3C, 00, 00, 75, 18, E8, 87, 60, 00, 00, 6A, 1E, E8, D1, 5E, 00, 00, 68, FF, 00, 00, 00, E8, 6C, F4, FF, FF, 59, 59, 85, DB, 74, 04, 8B, C3...
 
[+]

Entropy:
7.3006

Code size:
174 KB (178,176 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to server-54-240-162-181.fra6.r.cloudfront.net  (54.240.162.181:80)

Remove wwfraw__2347_il115396.exe - Powered by Reason Core Security