quicktime_download.exe

DownloadShield

The application quicktime_download.exe by DownloadShield has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from www.browserwin.com. While running, it connects to the Internet address ps533545.dreamhost.com on port 443.
Publisher:
DownloadShield  (signed and verified)

MD5:
a8b1eb9f6fd623ab7353f6a270f8b2a5

SHA-1:
4274ceb3dd15716c99ca4118a6e1fc2c9d8b3c69

SHA-256:
5f28de74cccc40d11cc7a032c06039e45cc2c3c7f6b683111ef3866c02b89751

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/27/2024 5:36:40 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.1.30.13

File size:
205.5 KB (210,392 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\quicktime_download.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/21/2015 9:00:00 PM

Valid to:
3/21/2019 7:59:59 PM

Subject:
CN=DownloadShield, O=DownloadShield, L=San Jose, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
78070F8D972292519C0C15749BCB3808

File PE Metadata
Compilation timestamp:
8/3/2015 10:43:56 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x31FD

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 57, 33, DB, 68, 01, 80, 00, 00, 89, 5C, 24, 1C, C7, 44, 24, 14, F0, 73, 40, 00, 33, F6, C6, 44, 24, 18, 20, FF, 15, B4, 70, 40, 00, FF, 15, B0, 70, 40, 00, 66, 83, F8, 06, 74, 11, 53, E8, F3, 26, 00, 00, 3B, C3, 74, 07, 68, 00, 0C, 00, 00, FF, D0, 68, E8, 73, 40, 00, E8, 74, 26, 00, 00, 68, E0, 73, 40, 00, E8, 6A, 26, 00, 00, 68, D4, 73, 40, 00, E8, 60, 26, 00, 00, 6A, 0D, E8, C3, 26, 00, 00, 6A, 0B, E8, BC, 26, 00, 00, A3, 00, 3C, 42, 00, FF, 15, 34, 70, 40, 00, 53, FF...
 
[+]

Entropy:
7.7246

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file quicktime_download.exe has been seen being distributed by the following URL.

http://www.browserwin.com/.../download

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to ps533545.dreamhost.com  (64.111.117.81:443)

TCP (HTTP):
Connects to p3nlhg686c1686.shr.prod.phx3.secureserver.net  (50.62.103.1:80)

TCP (HTTP):
Connects to server-54-230-5-8.dfw3.r.cloudfront.net  (54.230.5.8:80)

TCP (HTTP):
Connects to server-54-230-5-56.dfw3.r.cloudfront.net  (54.230.5.56:80)

TCP (HTTP):
Connects to server-52-84-126-19.iad16.r.cloudfront.net  (52.84.126.19:80)

TCP (HTTP):
Connects to a23-215-132-194.deploy.static.akamaitechnologies.com  (23.215.132.194:80)

TCP (HTTP SSL):
Connects to server-52-84-145-40.yto50.r.cloudfront.net  (52.84.145.40:443)

TCP (HTTP):
Connects to server-52-84-145-230.yto50.r.cloudfront.net  (52.84.145.230:80)

TCP (HTTP):
Connects to server-52-84-145-200.yto50.r.cloudfront.net  (52.84.145.200:80)

TCP (HTTP):
Connects to server-52-84-145-197.yto50.r.cloudfront.net  (52.84.145.197:80)

TCP (HTTP):
Connects to server-52-84-7-54.ord54.r.cloudfront.net  (52.84.7.54:80)

TCP (HTTP SSL):
Connects to server-52-84-132-46.atl52.r.cloudfront.net  (52.84.132.46:443)

TCP (HTTP):
Connects to server-52-84-132-194.atl52.r.cloudfront.net  (52.84.132.194:80)

TCP (HTTP):
Connects to server-52-84-132-127.atl52.r.cloudfront.net  (52.84.132.127:80)

TCP (HTTP):
Connects to server-52-84-126-28.iad16.r.cloudfront.net  (52.84.126.28:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-215-104-19.deploy.static.akamaitechnologies.com  (23.215.104.19:80)

Remove quicktime_download.exe - Powered by Reason Core Security