setup.exe

VisualBee

Visual Software Systems LTD

The application setup.exe by Visual Software Systems has been detected as a potentially unwanted program by 10 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars. The file has been seen being downloaded from yads.zedo.com and multiple other hosts.
Publisher:
Visual Software Systems LTD  (signed and verified)

Product:
VisualBee

Version:
V24.1.1

MD5:
3e95f968b32f9de42cc8f4866f6557ea

SHA-1:
5706657b6e0b623f208505f391985fdfb42e32af

SHA-256:
d83b9da9efd9b12ad2ef36852caaf09ee41d4827a68c59475515f2984459bc6a

Scanner detections:
10 / 68

Status:
Potentially unwanted

Explanation:
Uses the Solimba installer to bundle adware offers.

Analysis date:
11/27/2024 3:41:56 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
APPL/Solimba.Gen
7.11.120.118

Bkav FE
W32.Clod187.Trojan
1.3.0.4613

Dr.Web
Adware.Downware.1326
9.0.1.0240

ESET NOD32
Win32/DownWare
8.8944

Malwarebytes
MSIL.Solimba
v2014.08.28.12

McAfee
Artemis!859ECAE8008E
5600.7025

Reason Heuristics
PUP.Optional.Installer.F
14.8.28.0

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.14826

Sophos
Solimba Installer
4.96

Trend Micro House Call
TROJ_GEN.F47V0903
7.2.240

File size:
418.6 KB (428,600 bytes)

Product version:
V24.1.1

Copyright:
VisualBee.com

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
10/3/2012 8:00:00 PM

Valid to:
10/17/2013 7:59:59 PM

Subject:
CN=Visual Software Systems LTD, O=Visual Software Systems LTD, L=Tel Aviv - Yafo, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
02F58F3809AB50D82BED45D3CEAC82AD

File PE Metadata
Compilation timestamp:
12/5/2009 5:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:RGXkI06NUnwm6gMXaw0nTFe4wbFd4bgwNr3cb:MX106Nc16gM70U4wDw7gb

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.9239

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file setup.exe has been seen being distributed by the following 18 URLs.

http://yads.zedo.com/ads2/c?a=1671596;x=3840;g=172;c=1856000480,1856000480;i=2;n=1856;tg=1378341173;v=1000002;i=2;u=bUqy-AoBADYAAAxSt7AAAADM~090513;1=8;2=1;e=i;s=143;g=172;w=2;m=59;q=31907;z=0.12850483530201018;p=6;f=1944687;h=1853842;b=14400;k=http://network.adsmarket.com/.../jGdqnGKcqZeOYmmdX8p6w4iQcpVhnYGaiZBsmWaef5W3Z22bX5ypmI9maptf?dp=%z

http://yads.zedo.com/ads2/c?a=1671596;x=3840;g=172;c=1856000480,1856000480;i=0;n=1856;tg=1378311321;v=1000002;i=0;u=9pDH@AAxRUuVtXa2zAYW5Q**~081313;1=8;2=1;e=i;s=143;g=172;w=37;m=38;q=10021;z=0.4870636621490121;p=6;f=1944687;h=1853842;b=14400;k=http://network.adsmarket.com/.../jGdqnGKcqZeOYmmdX8p6w4iQcpVhnYGaiZBsmWaef5W3Z22bX5ypmI9maptf?dp=%z

http://yads.zedo.com/ads2/c?a=1671596;x=3840;g=172;c=1856000480,1856000480;i=0;n=1856;tg=1378359027;v=1000002;i=0;u=NP--4FhaRzWsUFxD0trxsA**~062213;1=8;2=1;e=i;s=143;g=172;w=37;m=197;q=10940;z=0.14643673575483263;p=6;f=1944687;h=1853842;b=14400;k=http://network.adsmarket.com/.../jGdqnGKcqZeOYmmdX8p6w4iQcpVhnYGaiZBsmWaef5W3Z22bX5ypmI9maptf?dp=%z

Remove setup.exe - Powered by Reason Core Security