ie-update.exe

Zoobam

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application ie-update.exe by Zoobam has been detected as adware by 27 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. While running, it connects to the Internet address tlb.hwcdn.net on port 80 using the HTTP protocol.
Publisher:
Zoobam  (signed and verified)

MD5:
3a55ef5f33dd26ab809168590152321d

SHA-1:
92b4fe7db0c39e02216399edfdba010586ed2172

SHA-256:
0a743c1950ea99df937cad966bdce262ee83234341dba8f9c7866f910cd12e3e

Scanner detections:
27 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 4:42:26 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.KJ
5745241

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Downware
2015.06.18

Avira AntiVirus
PUA/DownloadAdmin.Gen
8.3.1.6

Arcabit
Application.Bundler.KJ
1.0.0.425

avast!
Win32:Adware-CIX [PUP]
150602-1

AVG
Generic
2016.0.3075

Bitdefender
Application.Bundler.KJ
1.0.20.840

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Downloadadmin
0.98/20576

Comodo Security
Application.Win32.DownloadAdmin.ANGL
22485

Dr.Web
Trojan.Vittalia.36
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.KJ
10.0.0.5366

ESET NOD32
Win32/DownloadAdmin.H potentially unwanted application
7.0.302.0

F-Prot
W32/S-92ce39bf
v6.4.7.1.166

F-Secure
Adware:W32/WebInstallBundle
5.14.151

G Data
Application.Bundler.KJ
15.6.25

K7 AntiVirus
Unwanted-Program
13.205.16279

Malwarebytes
PUP.Optional.DownloadAdmin
v2015.06.17.10

MicroWorld eScan
Application.Bundler.KJ
16.0.0.504

NANO AntiVirus
Riskware.Win32.Downware.djahkt
0.30.24.2086

Norman
Application.Bundler.KJ
02.06.2015 14:23:46

Reason Heuristics
PUP.Tightrope.Bundler
15.6.17.18

Sophos
PUA 'DownloadAdmin' (of type Adware)
5.15

Total Defense
Win32/Tnega.IQCCUAC
37.1.62.1

Vba32 AntiVirus
Downloader.Agent
3.12.26.4

VIPRE Antivirus
Threat.4783369
40830

File size:
825.4 KB (845,208 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\content.ie5\d5g3tcxf\ie-update.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
10/15/2014 9:27:59 PM

Valid to:
10/15/2017 9:27:59 PM

Subject:
CN=Zoobam, O=Zoobam, L=Kirkland, S=Washington, C=US

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
4EA9D31E75E043

File PE Metadata
Compilation timestamp:
7/15/2014 11:29:31 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:kxpJfslZtuaVd9lpmhwQbift489IVGD4xJFl6Xqb5Kbmkg8Sb:Yp9sVuaVdvgVbmgGDijyikg5b

Entry address:
0x3345

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, 2E, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, C0, 33, 42, 00, E8, 1F, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, 0D, 24, 00, 00...
 
[+]

Entropy:
7.4926

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to st-sh-us-dc3-002.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-230-52-97.jfk6.r.cloudfront.net  (54.230.52.97:80)

TCP (HTTP):
Connects to server-54-192-55-38.jfk6.r.cloudfront.net  (54.192.55.38:80)

TCP (HTTP):
Connects to server-54-192-55-171.jfk6.r.cloudfront.net  (54.192.55.171:80)

TCP (HTTP):
Connects to server-54-192-55-136.jfk6.r.cloudfront.net  (54.192.55.136:80)

TCP (HTTP):
Connects to server-54-192-54-182.jfk6.r.cloudfront.net  (54.192.54.182:80)

TCP (HTTP SSL):
Connects to s3-1.amazonaws.com  (54.231.18.248:443)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):
Connects to a72-246-43-24.deploy.akamaitechnologies.com  (72.246.43.24:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to a173-223-204-194.deploy.static.akamaitechnologies.com  (173.223.204.194:80)

TCP (HTTP):
Connects to 50.22.63.140-static.reverse.softlayer.com  (50.22.63.140:80)

TCP (HTTP):
Connects to 208.101.20.2-static.reverse.softlayer.com  (208.101.20.2:80)

Remove ie-update.exe - Powered by Reason Core Security