addonsui.exe

Bubble Dock

NOSIBAY

The application addonsui.exe by NOSIBAY has been detected as a potentially unwanted program by 9 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from cdn.bubbledock.es and multiple other hosts. While running, it connects to the Internet address server-54-230-11-141.lhr3.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
NOSIBAY  (signed and verified)

Product:
Bubble Dock

Version:
3.0.705.0.62789

MD5:
b80241f8d24acd250dd3d3d2d86e6dd1

SHA-1:
530b4574f2589ddbaf049c846dfeb454bcc5aab9

SHA-256:
3289d6a058ddb4be97bf0a973bbbda41188aeeac8a1806a73c328553ef697eaa

Scanner detections:
9 / 68

Status:
Potentially unwanted

Analysis date:
11/22/2024 7:55:29 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2016.0.3140

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Adware.Downware.10519
9.0.1.0103

herdProtect (fuzzy)
2015.7.15.16

McAfee
Artemis!B80241F8D24A
5600.6796

Reason Heuristics
PUP.Installer.NOSIBAY
15.4.13.17

Trend Micro House Call
Suspicious_GEN.F47V0320
7.2.103

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.3

VIPRE Antivirus
BubbleDock
38918

File size:
631.7 KB (646,904 bytes)

Copyright:
© Nosibay

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\content.ie5\4g8sjiof\addonsui.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
9/25/2014 2:00:00 AM

Valid to:
12/26/2015 12:59:59 AM

Subject:
CN=NOSIBAY, OU=Secure Application Development, O=NOSIBAY, L=PEROLS, S=Hérault, C=FR

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
52E368957AD1C7202A103C7CFD7BD6C2

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:7e34x9B3ri0RfDR9/0dZWLMb0Xudr3RPA6YHey2ZYc6Hknq73ZX8wjveEtt2NB68:RTBj/02kdr3RHYz2TqNyEWfXskbN2fA

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file addonsui.exe has been seen being distributed by the following 7 URLs.

http://cdn.bubbledock.es/dld/update/2015_01_28/.../AddonsUI.exe

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to server-54-230-11-141.lhr3.r.cloudfront.net  (54.230.11.141:80)

Remove addonsui.exe - Powered by Reason Core Security