icreinstall_word installer.exe

Download and Install Ltd

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_word installer.exe by Download and Install has been detected as adware by 18 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from install.downloadscenter.com and multiple other hosts. While running, it connects to the Internet address os.solvefile.com on port 80 using the HTTP protocol.
Publisher:
Download and Install Ltd  (signed and verified)

MD5:
002361b686b68e628d1d8dc986c7b45f

SHA-1:
45ee5375ed4abbd4dc706621fef69cf31a8b59c7

SHA-256:
b570427263fbadf52c4df243234d05736c47fd1289df7b872aed8335744f3da1

Scanner detections:
18 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/28/2024 10:10:38 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.53116
982

Agnitum Outpost
PUA.InstallCore
7.1.1

Bitdefender
Gen:Variant.Strictor.53116
1.0.20.740

Dr.Web
Trojan.Packed.25266
9.0.1.0148

Emsisoft Anti-Malware
Gen:Variant.Strictor.53116
8.14.05.28.03

ESET NOD32
Win32/InstallCore.BY (variant)
8.9738

Fortinet FortiGate
Riskware/InstallCore
5/28/2014

F-Prot
W32/InstallCore.R3.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Strictor.53116
11.2014-28-05_4

G Data
Gen:Variant.Strictor.53116
14.5.24

IKARUS anti.virus
Backdoor.Hupigon
t3scan.1.6.1.0

McAfee
Artemis!002361B686B6
5600.7116

MicroWorld eScan
Gen:Variant.Strictor.53116
15.0.0.444

Reason Heuristics
PUP.DownloadandInstall.AA
14.8.7.18

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.14526

Trend Micro House Call
TROJ_GEN.F47V0227
7.2.148

Vba32 AntiVirus
3.12.26.0

VIPRE Antivirus
InstallCore.b
28692

File size:
627.5 KB (642,592 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_word installer.exe

Digital Signature
Authority:
GoDaddy.com, Inc.

Valid from:
9/22/2012 2:33:56 AM

Valid to:
9/14/2014 11:31:22 AM

Subject:
CN=Download and Install Ltd, O=Download and Install Ltd, L=London, S=London, C=GB

Issuer:
SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
082658FA2A383E

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:k2XyMJfsGn9NGHy8nydSNzidTjBYj0m2nMqzXGe9zRsHN2j2vJ9H6fT:kayMJfsCNiydSSE2Hzr9zy1R9cT

Entry address:
0x98CC

Entry point:
55, 8B, EC, 83, C4, CC, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, FA, 97, FF, FF, E8, 01, AA, FF, FF, E8, 2C, CC, FF, FF, E8, 73, CC, FF, FF, E8, 0A, F3, FF, FF, E8, 71, F4, FF, FF, 33, C0, 55, 68, 76, 9F, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 2C, 9F, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, B0, 40, 00, E8, 9B, FE, FF, FF, E8, 26, FA, FF, FF, 8D, 55, F0, 33, C0, E8, E0, D0, FF, FF, 8B, 55, F0, B8, D8, BD, 40, 00, E8, AB, 98, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, D8, BD, 40, 00, B2, 01, B8...
 
[+]

Entropy:
7.7543

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
36 KB (36,864 bytes)

The file icreinstall_word installer.exe has been seen being distributed by the following 5 URLs.

http://install.downloadscenter.com/installer/.../download?s=yb&k= microsoft word processor

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdneu.webfilescdn.com  (65.254.40.36:80)

Remove icreinstall_word installer.exe - Powered by Reason Core Security