dailywiki.exe

DailyWiki

The executable dailywiki.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘DailyWiki’.
Publisher:
DailyWiki  (signed and verified)

MD5:
7c70e86aae12fca57332be854d363438

SHA-1:
e1159369b6a3c0906977418f741839166ca8e352

SHA-256:
3bec4c67dc36bfa003960cacbbf41dc7d8b367f691028daf12f1af8e5ca69fd6

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
11/23/2024 2:53:46 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.3.10.15

File size:
45.6 MB (47,825,264 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\dailywiki\dailywiki.exe

Digital Signature
Signed by:

Authority:
DailyWiki

Valid from:
9/19/2015 3:16:51 AM

Valid to:
9/16/2025 3:16:51 AM

Subject:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Issuer:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Serial number:
00DE81C7E6A224F568

File PE Metadata
Compilation timestamp:
2/17/2017 4:17:08 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x1C9A083

Entry point:
E8, 98, 3A, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 55, 0C, A1, 20, A8, EC, 02, F7, D2, 8B, 4D, 08, 23, D0, 23, 4D, 0C, 0B, D1, 89, 15, 20, A8, EC, 02, 5D, C3, E8, A7, 20, 00, 00, 85, C0, 74, 08, 6A, 16, E8, 6A, 21, 00, 00, 59, F6, 05, 20, A8, EC, 02, 02, 74, 21, 6A, 17, E8, 97, 24, 60, 00, 85, C0, 74, 05, 6A, 07, 59, CD, 29, 6A, 01, 68, 15, 00, 00, 40, 6A, 03, E8, A7, F8, FF, FF, 83, C4, 0C, 6A, 03, E8, 14, FC, FF, FF, CC, 55, 8B, EC, 8D, 45, 18, 50, 6A, 00, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75...
 
[+]

Entropy:
6.8794

Code size:
34.9 MB (36,637,696 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
DailyWiki

Command:
C:\users\{user}\appdata\roaming\dailywiki\dailywiki.exe su


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to server-54-230-7-125.dfw3.r.cloudfront.net  (54.230.7.125:443)

TCP (HTTP SSL):
Connects to sa.ia1.scorecardresearch.com  (165.193.73.50:443)

TCP (HTTP SSL):
Connects to r-199-59-148-84.twttr.com  (199.59.148.84:443)

TCP (HTTP SSL):
Connects to ec2-54-204-21-169.compute-1.amazonaws.com  (54.204.21.169:443)

TCP (HTTP SSL):
Connects to ec2-54-201-250-36.us-west-2.compute.amazonaws.com  (54.201.250.36:443)

TCP (HTTP SSL):
Connects to ec2-54-173-223-128.compute-1.amazonaws.com  (54.173.223.128:443)

TCP (HTTP SSL):
Connects to ec2-52-39-108-214.us-west-2.compute.amazonaws.com  (52.39.108.214:443)

TCP (HTTP SSL):
Connects to ec2-52-35-179-99.us-west-2.compute.amazonaws.com  (52.35.179.99:443)

TCP (HTTP SSL):
Connects to ec2-52-204-43-145.compute-1.amazonaws.com  (52.204.43.145:443)

TCP (HTTP SSL):
Connects to ec2-35-164-231-206.us-west-2.compute.amazonaws.com  (35.164.231.206:443)

TCP (HTTP SSL):
Connects to ec2-35-163-143-80.us-west-2.compute.amazonaws.com  (35.163.143.80:443)

TCP (HTTP SSL):
Connects to a23-76-195-2.deploy.static.akamaitechnologies.com  (23.76.195.2:443)

TCP (HTTP SSL):
Connects to a172-230-215-222.deploy.static.akamaitechnologies.com  (172.230.215.222:443)

TCP (HTTP SSL):
Connects to 80.83.2ea9.ip4.static.sl-reverse.com  (169.46.131.128:443)

TCP (HTTP SSL):
Connects to 47.30.acb8.ip4.static.sl-reverse.com  (184.172.48.71:443)

TCP (HTTP SSL):
Connects to 168.bm-nginx-loadbalancer.mgmt.nym2.adnexus.net  (68.67.178.252:443)

TCP (HTTP SSL):
Connects to 162.208.117.18.static.nyinternet.net  (162.208.117.18:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-dft4.fbcdn.net  (157.240.3.24:443)

TCP (HTTP SSL):
Connects to server-54-230-5-236.dfw3.r.cloudfront.net  (54.230.5.236:443)

TCP (HTTP SSL):
Connects to server-54-230-123-42.dfw50.r.cloudfront.net  (54.230.123.42:443)

Remove dailywiki.exe - Powered by Reason Core Security