kae1qofy.exe

Shlomy Golani

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions which inject ads in the browser. The file kae1qofy.exe, “Installer for SummerSoft” by Shlomy Golani has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address r1.stylezip.info on port 80 using the HTTP protocol.
Publisher:
SummerSoft  (signed by Shlomy Golani)

Product:
SummerSoft

Description:
Installer for SummerSoft

Version:
2013.8.25.1639

MD5:
17d73263ca2ce5748ac0e714a5b3eb9b

SHA-1:
15e6816f679ab973acaf812d983c3baa7474117b

SHA-256:
3d867b840137ec3e53cd16cbf9b9095eb73d18b8b8e0663d9e26a00a368e9ed5

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses Web-Pick's 'File Product', an Installer which wraps various products and downloads and installs it silently through the process, hosted on TusFiles.

Analysis date:
12/25/2024 12:35:23 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.WebPick (M)
17.3.15.16

File size:
312.6 KB (320,096 bytes)

Product version:
1.0.0.1

Copyright:
Copyright © 2012 SummerSoft

Original file name:
TSULoader.exe

Installer:
WebPick InstalleRex (Tarma)

Language:
Turkish (Turkey)

Common path:
C:\users\{user}\appdata\local\temp\kae1qofy.exe.part

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
1/17/2013 2:00:00 AM

Valid to:
1/18/2014 1:59:59 AM

Subject:
CN=Shlomy Golani, O=Shlomy Golani, STREET=Wingate 56, L=Beer Sheva, S=Beer Sheva, PostalCode=84428, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
009FC86200EC0FF58D1C39395238030858

File PE Metadata
Compilation timestamp:
3/12/2013 10:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove kae1qofy.exe - Powered by Reason Core Security