download.setup__7818_i606960162_il7628554.exe

Amonetize ltd.

This is the Amonetize download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application download.setup__7818_i606960162_il7628554.exe by Amonetize ltd has been detected as adware by 21 anti-malware scanners. The program is a setup application that uses the Amonetize Downloader installer. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
Amonetize ltd.  (signed and verified)

Version:
1.1.5.26

MD5:
e1a28bf16135a8e8083fbb0d110d469b

SHA-1:
f1d1bd144c180ce6d854e9d3dd1a7e30c1e649af

SHA-256:
7db08126506ab44169151e804bcd8943966a630500686df059438a94d81427f6

Scanner detections:
21 / 68

Status:
Adware

Explanation:
This setup file is a re-distribution of the original program that bundles various adware offers during installation including toolbars and browser search extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/24/2024 5:25:50 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.11241702
1010

AhnLab V3 Security
PUP/Win32.Amonetiz
14.04.27

Avira AntiVirus
ADWARE/Adware.Gen2
7.11.145.118

avast!
Win32:Amonetize-AX [PUP]
2014.9-140427

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.14430

Bitdefender
Trojan.Generic.11241702
1.0.20.600

Dr.Web
Adware.Downware.3081
9.0.1.0117

Emsisoft Anti-Malware
Trojan.Generic.11241702
8.14.04.30.09

ESET NOD32
Win32/Amonetize.AJ (variant)
8.9728

G Data
Trojan.Generic.11241702
14.4.24

K7 AntiVirus
Trojan
13.177.11922

Malwarebytes
PUP.Optional.Amonetize.A
v2014.04.27.11

McAfee
Artemis!E1A28BF16135
5600.7147

MicroWorld eScan
Trojan.Generic.11241702
15.0.0.360

nProtect
Trojan.Generic.11241702
14.04.29.01

Qihoo 360 Security
Win32/Trojan.Adware.37e
1.0.0.1015

Reason Heuristics
PUP.Installer.Amonetizeltd.i
14.8.7.20

Rising Antivirus
PE:Malware.Adware!6.1890
23.00.65.14425

Sophos
Amonetize
4.98

Trend Micro House Call
TROJ_GEN.F47V0427
7.2.117

VIPRE Antivirus
Amonetize
28638

File size:
349.9 KB (358,248 bytes)

Product version:
1.1.5.26

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Amonetize Downloader

Language:
English (United States)

Common path:
C:\users\{user}\downloads\download.setup__7818_i606960162_il7628554.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/29/2013 2:00:00 AM

Valid to:
10/30/2014 1:59:59 AM

Subject:
CN=Amonetize ltd., OU=Amonetize ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Amonetize ltd., L=Raanana, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
72A9E57303DC103CAE5E2F5A83513E22

File PE Metadata
Compilation timestamp:
4/27/2014 8:00:32 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:grxqjufmXmY7c2wLQalXO15VBjLCKwPzeYatn+KHWU0aE/C2naO+LoC2WZYUHe:grxqjufumY7yLQsXOX/jL00uU5wC2U2F

Entry address:
0x29D31

Entry point:
E8, 97, 9F, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F...
 
[+]

Code size:
245 KB (250,880 bytes)

The file download.setup__7818_i606960162_il7628554.exe has been seen being distributed by the following URL.