dailywiki.exe

DailyWiki

The executable dailywiki.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘DailyWiki’. This file is typically installed with the program DailyWiki - DailyWiki for Desktop by DailyWiki. While running, it connects to the Internet address 114.255.178.107.bc.googleusercontent.com on port 443.
Publisher:
DailyWiki  (signed and verified)

MD5:
ca85643eff2d0c80f25e122cc5cc8c9e

SHA-1:
7637dc96bec92927a14ce547eb7ea81c3e30c286

SHA-256:
26790ac1785ee3a0117cdaea2340b5abd729585ba61c068a519b5e335bfbfcd6

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
11/23/2024 2:12:32 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
16.11.1.8

File size:
47.9 MB (50,243,520 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\dailywiki\dailywiki.exe

Digital Signature
Signed by:

Authority:
DailyWiki

Valid from:
9/19/2015 3:16:51 AM

Valid to:
9/16/2025 3:16:51 AM

Subject:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Issuer:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Serial number:
00DE81C7E6A224F568

File PE Metadata
Compilation timestamp:
2/20/2016 7:43:51 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
786432:EuK9C64r1c7VQZgnUrurLpbH05yL5dsuUQq6+4UYOkdOXQp6vm2s:ZwC64r1c6ZgnUSrLpbUAdBUQq6/BLF60

Entry address:
0x1C9A031

Entry point:
E8, 5A, 3A, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 55, 0C, A1, 20, A8, EC, 02, F7, D2, 8B, 4D, 08, 23, D0, 23, 4D, 0C, 0B, D1, 89, 15, 20, A8, EC, 02, 5D, C3, E8, 09, 21, 00, 00, 85, C0, 74, 08, 6A, 16, E8, CC, 21, 00, 00, 59, F6, 05, 20, A8, EC, 02, 02, 74, 21, 6A, 17, E8, D9, 20, 60, 00, 85, C0, 74, 05, 6A, 07, 59, CD, 29, 6A, 01, 68, 15, 00, 00, 40, 6A, 03, E8, A9, F8, FF, FF, 83, C4, 0C, 6A, 03, E8, 16, FC, FF, FF, CC, 55, 8B, EC, 8D, 45, 18, 50, 6A, 00, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75...
 
[+]

Entropy:
6.9680

Code size:
34.9 MB (36,634,112 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
DailyWiki

Command:
C:\users\{user}\appdata\roaming\dailywiki\dailywiki.exe su


The file dailywiki.exe has been discovered within the following program.

About 4% of users remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to server-52-85-63-103.lhr50.r.cloudfront.net  (52.85.63.103:443)

TCP (HTTP SSL):
Connects to rtr3.l7.search.vip.ir2.yahoo.com  (217.12.15.96:443)

TCP (HTTP):
Connects to ec2-54-221-206-77.compute-1.amazonaws.com  (54.221.206.77:80)

TCP (HTTP SSL):

TCP (HTTP):
Connects to ec2-50-16-193-32.compute-1.amazonaws.com  (50.16.193.32:80)

TCP (HTTP SSL):
Connects to ec2-35-165-77-37.us-west-2.compute.amazonaws.com  (35.165.77.37:443)

TCP (HTTP):
Connects to ec2-174-129-208-167.compute-1.amazonaws.com  (174.129.208.167:80)

TCP (HTTP SSL):
Connects to a92-123-180-186.deploy.akamaitechnologies.com  (92.123.180.186:443)

TCP (HTTP SSL):
Connects to walmart.com.ssl.d1.sc.omtrdc.net  (63.140.40.196:443)

TCP (HTTP SSL):
Connects to unknown.telstraglobal.net  (210.176.156.61:443)

TCP (HTTP SSL):
Connects to smrtpxl-mtc-b.evip.aol.com  (64.12.228.31:443)

TCP (HTTP):
Connects to server-54-230-216-211.mrs50.r.cloudfront.net  (54.230.216.211:80)

TCP (HTTP):
Connects to server-54-230-216-21.mrs50.r.cloudfront.net  (54.230.216.21:80)

TCP (HTTP):
Connects to server-54-230-216-120.mrs50.r.cloudfront.net  (54.230.216.120:80)

TCP (HTTP SSL):
Connects to server-54-192-51-10.jfk5.r.cloudfront.net  (54.192.51.10:443)

TCP (HTTP SSL):
Connects to server-54-192-232-134.nrt12.r.cloudfront.net  (54.192.232.134:443)

TCP (HTTP SSL):
Connects to server-205-251-251-35.jfk5.r.cloudfront.net  (205.251.251.35:443)

TCP (HTTP SSL):
Connects to rtr3.l7.search.vip.sg3.yahoo.com  (106.10.162.43:443)

TCP (HTTP SSL):
Connects to m-prd-umpxl-adcom-mtc-b.evip.aol.com  (149.174.28.143:443)

TCP (HTTP SSL):
Connects to m-prd-pxl-adcom-mtc-b.evip.aol.com  (149.174.28.142:443)

Remove dailywiki.exe - Powered by Reason Core Security