java_setup.exe

Build Input

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application java_setup.exe, “System Applet ” by Build Input has been detected as adware by 48 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
System Applet   (signed by Build Input)

Product:
System Applet

Description:
System Applet

Version:
2.4.8.1

MD5:
22d9fd4b5c51dc7d68a07cdf4fd597f9

SHA-1:
838d6ae5c50e8278010468822bfde7bbef239713

SHA-256:
bfdaa823df6597c1c0f7add2f92ac7837836310021e761b99b703b123ae63a88

Scanner detections:
48 / 68

Status:
Adware

Explanation:
Injects advertisements in the web browser in the form or banner ads and popups.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/28/2024 5:39:03 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.1618449
905

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
2014.08.14

Avira AntiVirus
TR/Click.Clikug.A.34
7.11.142.94

avast!
Adware-gen [Adw]
2014.9-140814

AVG
Clicker
2015.0.3383

Baidu Antivirus
Trojan.Win32.Clikug
4.0.3.141028

Bitdefender
Trojan.GenericKD.1618449
1.0.20.1130

Clam AntiVirus
Win.Adware.Ibryte-592
0.98/19086

Comodo Security
Application.Win32.iBryte.WRP
18251

Dr.Web
Trojan.Click3.5306
9.0.1.0226

Emsisoft Anti-Malware
Trojan.GenericKD.1618449
8.14.08.14.04

ESET NOD32
Win32/GigaClicks.AD (variant)
8.9734

Fortinet FortiGate
W32/Malware_fam.NB
8/14/2014

F-Prot
W32/A-c255719d
v6.4.7.1.166

F-Secure
Trojan.GenericKD.1618449
11.2014-14-08_5

G Data
Trojan.GenericKD.1618449
14.8.24

herdProtect (fuzzy)
2014.10.28.13

IKARUS anti.virus
Trojan-Clicker.BFNI
t3scan.1.6.1.0

K7 AntiVirus
Riskware
13.176.11711

Kaspersky
Trojan-Clicker.Win32.Agent
14.0.0.3409

Malwarebytes
PUP.Optional.GigaClicks.A
v2014.08.14.04

McAfee
Artemis!0FF2B0F7AD04
5600.7039

Microsoft Security Essentials
TrojanClicker:Win32/Clikug.A
1.10401

MicroWorld eScan
Trojan.GenericKD.1618449
15.0.0.678

NANO AntiVirus
Trojan.Win32.Adpeak.cumkpw
0.28.0.59826

Norman
IBryte.PDB
11.20141028

nProtect
Trojan.GenericKD.1618449
14.04.10.01

Panda Antivirus
Suspicious file
14.08.14.04

Qihoo 360 Security
Win32/Trojan.Dropper.c9f
1.0.0.1015

Quick Heal
(Suspicious) - DNAScan
10.14.12.00

Reason Heuristics
PUP.Installer.BuildInput.K
14.8.25.1

Rising Antivirus
PE:Malware.iBryte!6.192B
23.00.65.14812

Sophos
Mal/Generic-S
4.98

SUPERAntiSpyware
PUP.OptimumInstaller/Variant
10423

Trend Micro House Call
TROJ_CLIKUG.A
7.2.301

Trend Micro
TROJ_CLIKUG.A
10.465.28

Vba32 AntiVirus
3.12.26.0

VIPRE Antivirus
Trojan.Win32.Clicker
28188

Zillya! Antivirus
Adware.iBryte.Win32.854
2.0.0.1790

File size:
132.4 KB (135,544 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2014 System Applet

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion (using Nullsoft Install System)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\java_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 5:00:00 PM

Valid to:
3/24/2015 4:59:59 PM

Subject:
CN=Build Input, O=Build Input, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0093C151407610A7B56F799C03CB8D955D

File PE Metadata
Compilation timestamp:
5/11/2014 1:04:44 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
1536:q+0YBsBE3ain2Q5xq10DZYzI1wHCrbreqr1L0wVQMw3zEfkQLad:qjnBTi2CRDZYzIq6bqqr1PQMw32kv

Entry address:
0x322E

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 14, C7, 44, 24, 10, D8, A2, 40, 00, 89, 6C, 24, 1C, FF, 15, 34, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, 34, 81, 40, 00, 55, FF, 15, AC, 82, 40, 00, 6A, 08, A3, 58, AF, 47, 00, E8, 9F, 2E, 00, 00, A3, A4, AE, 47, 00, 55, 8D, 44, 24, 34, 68, B4, 02, 00, 00, 50, 55, 68, B8, 01, 44, 00, FF, 15, 7C, 81, 40, 00, 68, C0, A2, 40, 00, 68, A0, 2E, 47, 00, E8, 0A, 2B, 00, 00, FF, 15, 38, 81, 40, 00, BB, 00, B0, 4C, 00, 50, 53, E8, F8, 2A, 00, 00...
 
[+]

Entropy:
4.9541

Packer / compiler:
Nullsoft install system v2.x

Code size:
24.5 KB (25,088 bytes)

The file java_setup.exe has been seen being distributed by the following URL.

Remove java_setup.exe - Powered by Reason Core Security