icreinstall_microsoft-word-2010.exe

Gulusul

SpeedyPrompt (Fried Cookie Ltd)

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_microsoft-word-2010.exe, “Gulusul Setup ” by SpeedyPrompt (Fried Cookie) has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
SpeedyPrompt (Fried Cookie Ltd)  (signed and verified)

Product:
Gulusul

Description:
Gulusul Setup

Version:
1.2.2.6

MD5:
f9757604267c2927a75e27acd3f927c2

SHA-1:
24d13b303ce888972d77b22a684f214b5cfe7942

SHA-256:
57a79914e27fd8581a65c64cb6bc6cddd1f177769fc4932a6965c22a0d5cca9c

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
1/6/2025 11:42:39 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.InstallCore.FC.Installer (M)
16.5.16.14

File size:
1002.1 KB (1,026,120 bytes)

Product version:
2.6.3

Copyright:
Lite Program

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_microsoft-word-2010.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
12/17/2015 3:03:52 PM

Valid to:
5/20/2016 6:07:50 PM

Subject:
CN=SpeedyPrompt (Fried Cookie Ltd), O=SpeedyPrompt (Fried Cookie Ltd), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121D77437A5B286B055B435AA59CB4BA265

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:iQiZ4Cee716maCIJPMWb2L5z7NuvJKKJDQ76Yafb:i9R6iIu2c5z7Nuv82DQ76Y6

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

The file icreinstall_microsoft-word-2010.exe has been seen being distributed by the following 23 URLs.

http://www.vaulthostinglaboratory.com/c?x=xpBnWV5reMPZAFwxc2fbo3LIzVftTo8cJgDNHfgPjY4=&c=ED3L1pQm3PdLWsOa0AOe40 E/rJPCPZnKNiUAjG2sMEugJ3XzfmXQTo9M0k ruKwYZ4Vb9 q41ej8PY1kBT0UU1sLn5Tl3vy9l5I1Qpfldf 1Ehq2Evm5RAMRyORvivvWw9LNJN/6KtEcQSasg638SsI0/fiaudocCR1GCf2lm9RHCN4z7 6Kgwdj4RnXaQk&e=0&fallback_url=https://secure.inndl.com/.../microsoft-word-2010.exe

http://www.vaulthostinglaboratory.com/c?x=q634GGR07Qo6mKleMQVtAbI8A/Gh/HmOW6ffhAL9mJg=&c=u7kekXD1SORrA8oQ9OmmgCsZl0BX2usdXJONY3Ic5SUyA3DupkdXtv0ukp07mfrtu RbHLUw6XymYKz2HWkL6aA I8V2kiqNPZ8dFyYdddrTENQcvnEmnenilIJfGEcCiNWvLIkpbG54bqZmQ5JoThia4R13eL0zLmoDT9MP2F5VR8ecuqgyi/i3aSkLdNPb&e=0&fallback_url=https://secure.inndl.com/.../microsoft-word-2010.exe

http://www.vaulthostinglaboratory.com/c?x=5ilVCtVInujx/ib9ih9WfG8HprHH0vfFHUjfiC1TqCA=&c=ZFW5hY XEBJxT8EhhId6yeTSgCBwyphX8Ll1rIKLnQC9BntOomvH081ligC84UHZ/24ksw2IIwWvHvgs/0GaF32qskvxpEtLo52lr8 mdDeYs9A4Wpm8li/wzgyEdvl0UT5DmNUyCkl oepz6v8ZsjZ4h/eaW8ByPi2onOfoxZGqH2PJ75711iDDm2A064lk&e=0&fallback_url=https://secure.inndl.com/.../microsoft-word-2010.exe

http://www.vaulthostinglaboratory.com/c?x=xuvU1o9CyxFb6x2mUA36HqWa6Y sc04KQixVOiNRpYU=&c=kz8kTIh88EMb1mNpGdNyDKIb6LQigzPCb2ALrGINgcLgJLmaRIluY2O4v4FxyCMzzWC5QtvErR5/q2RpFOTwwrczvdKGrBrsCYN/rbc6Y8tQQ6MsIzJKs0ivYfoesY2pLBUkxfChW7iAvqF1vzMD6YTp0KcJOsCT5K3kA HK0ZY=&e=0&fallback_url=https://secure.inndl.com/.../microsoft-word-2010.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

Remove icreinstall_microsoft-word-2010.exe - Powered by Reason Core Security