open officesetup.exe

SuperCool Applications

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application open officesetup.exe by SuperCool Applications has been detected as adware by 17 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
SuperCool Applications  (signed and verified)

MD5:
8fcd8f951eae80f1f48f777fc36cba77

SHA-1:
29bf37a1fba81c92a2aa1e09c6d39a7dfcfb12f2

SHA-256:
fc243ec5763ecbe6219f24cde7da7ab4824ebbaa25e94756c5df02c42ecb6191

Scanner detections:
17 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/28/2024 3:08:45 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
PUA/InstallCore.Gen7
8.3.1.6

avast!
Win32:PUP-gen [PUP]
150602-1

AVG
Adware InstallCore.LA
2015.0.4355

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Installcore-275
0.98/20576

Dr.Web
Trojan.Packed.24524
9.0.1.05190

ESET NOD32
Win32/InstallCore.IK potentially unwanted application
7.0.302.0

F-Prot
W32/InstallCore.AG.gen
v6.4.7.1.166

K7 AntiVirus
Unwanted-Program
13.205.16279

Malwarebytes
v2015.06.17.06

NANO AntiVirus
Riskware.Win32.InstallCore.dnakdk
0.30.24.2086

Reason Heuristics
PUP.installCore.Installer
15.6.17.18

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.15615

Sophos
PUA 'Install Core Click run software'
5.15

Total Defense
Win32/InstallCore.A!generic
37.1.62.1

Vba32 AntiVirus
3.12.26.4

VIPRE Antivirus
Threat.4788237
40830

File size:
1.1 MB (1,107,200 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\open officesetup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/15/2013 1:00:00 AM

Valid to:
8/16/2014 12:59:59 AM

Subject:
CN=SuperCool Applications, O=SuperCool Applications, STREET=63 Ronthscheld Blvd., L=Tel Aviv, S=Israel, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
7239B70290995A99967AE1DE581942C0

File PE Metadata
Compilation timestamp:
6/19/1992 11:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:vvSgsm2AgadTQIidArmCL54rWILwpf0IPyUyxPyQc:npdWIiqp4iILwZyN6N

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8395

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to unknown.prolexic.com  (92.242.140.21:80)

TCP (HTTP):
Connects to server-54-230-52-164.jfk6.r.cloudfront.net  (54.230.52.164:80)

TCP (HTTP):

Remove open officesetup.exe - Powered by Reason Core Security