setup.exe

Deals Interactive Media, LLC

The software will display additional offers (such as adware) during installation including a browser toolbar/extension as well as advertising injection software (part of the Injekt brand). The application setup.exe by Deals Interactive Media has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from im.questspoint.com.
Publisher:
Deals Interactive Media, LLC  (signed and verified)

MD5:
4c2b329d59c1722492dc9aed9443bc29

SHA-1:
41e20ebef201280bbfe96d57f84cd98e1e681f16

SHA-256:
edbf9c57807a33a8c43b9613664cb90d1243953aada27810b0430a1213dda559

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
11/30/2024 9:09:40 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
16.9.12.6

File size:
3.9 MB (4,055,600 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/1/2014 9:00:00 PM

Valid to:
7/2/2015 8:59:59 PM

Subject:
CN="Deals Interactive Media, LLC", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Deals Interactive Media, LLC", L=Houston, S=Texas, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
293C89819F1335C143553D8C2A0EF766

File PE Metadata
Compilation timestamp:
6/6/2009 6:41:48 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:1Zp1flUoZQaZ48x04Jn/hPyw3jEwp1VK4fj/2Ni3Cquzp1fle:1ZrNUoyg7PZEwp1VK4vluzrNe

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 3F, 42, 00, E8, F1, 2B, 00, 00, A3, 84, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 36, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file setup.exe has been seen being distributed by the following URL.

http://im.questspoint.com/rs/.../Setup.exe

Remove setup.exe - Powered by Reason Core Security