browsecoupon_setup.exe

Ostap Laponov

This program bundles adware during the download and install process using the InstaleRex pay-per-install app monetizer. The application browsecoupon_setup.exe by Ostap Laponov has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the WebPick InstalleRex installer. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address r1.stylezip.info on port 80 using the HTTP protocol.
Publisher:
Ostap Laponov  (signed and verified)

MD5:
5e7f4d44ceee98c05f344ae3333f1c08

SHA-1:
9e574445136d83f96f4837fa2af1da8d90e34230

SHA-256:
da51884d97e72c3a9d3b4cc12cf615d91bd0cf7f968e089d9c068f3683b61311

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses Web-Pick's 'File Product', an Installer which wraps various products and downloads and installs it silently through the process.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/25/2024 1:22:27 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.WebPick (M)
17.3.11.20

File size:
672.5 KB (688,664 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
WebPick InstalleRex

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\addons\browsecoupon_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/8/2013 7:00:00 PM

Valid to:
9/9/2014 6:59:59 PM

Subject:
CN=Ostap Laponov, O=Ostap Laponov, STREET=Minskаya 16, L=Kiev, S=Kiev, PostalCode=04078, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00EA64F94CDE70375038736C9F1C0960DF

File PE Metadata
Compilation timestamp:
12/2/2013 10:27:36 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

Entry address:
0x10687

Entry point:
E8, 38, 3F, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, 28, F0, 41, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, 2C, F0, 41, 00, 5D, C3, 05, 44, FF, FF, FF, 6A, 0E, 59, 3B, C8, 1B, C0, 23, C1, 83, C0, 08, 5D, C3, E8, DC, 07, 00, 00, 85, C0, 75, 06, B8, 90, F1, 41, 00, C3, 83, C0, 08, C3, E8, C9, 07, 00, 00, 85, C0, 75, 06, B8, 94, F1, 41, 00, C3, 83, C0, 0C, C3, 8B, FF, 55, 8B, EC, 56, E8, E2, FF, FF, FF, 8B, 4D, 08...
 
[+]

Entropy:
7.8624  (probably packed)

Code size:
96 KB (98,304 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove browsecoupon_setup.exe - Powered by Reason Core Security