setup.exe

Small Island Development

The software will display additional offers (such as adware) during installation including a browser toolbar/extension as well as advertising injection software (part of the Injekt brand). The application setup.exe by Small Island Development has been detected as adware by 25 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. According to AVG, this software downloads additional adware offers during setup. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from gp387a.sazzip.com.
Publisher:
Small Island Development  (signed and verified)

MD5:
b41ddc192c550fb7f35bcace5dcb4adb

SHA-1:
640f970077d409a1e1c3d254f29ccaf4b3128ac3

SHA-256:
af31d9b7b78487feb3a9cb0a52236ecca20379d09c784d52cc6a0dacd860c287

Scanner detections:
25 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
12/27/2024 1:52:54 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.1002757
6306382

AhnLab V3 Security
PUP/Win32.TVWizard
2014.12.28

Avira AntiVirus
Adware/PullUpdate.AP
7.11.198.70

AVG
Potentially harmful program Downloader.CBD
2014.0.4235

Baidu Antivirus
Adware.Win32.PullUpdate
4.0.3.141227

Bitdefender
Application.Generic.1002757
1.0.20.1805

Comodo Security
ApplicUnwnt
20505

Dr.Web
Adware.Yontoo.55
9.0.1.05190

Emsisoft Anti-Malware
Application.Generic.1002757
9.0.0.4668

ESET NOD32
multiple threats
7.0.302.0

Fortinet FortiGate
Adware/PullUpdate
12/27/2014

F-Secure
Application.Generic.1002757
11.2014-27-12_7

G Data
Application.Generic.1002757
14.12.24

IKARUS anti.virus
AdWare.Agent
t3scan.1.8.5.0

K7 AntiVirus
Adware
13.188.14468

Malwarebytes
PUP.Optional.TVWizard.A
v2014.12.27.10

McAfee
Program.Artemis!010ABA74C881
16.8.708.2

MicroWorld eScan
Application.Generic.1002757
15.0.0.1083

Norman
Application.Generic.1002757
04.12.2014 14:30:06

Panda Antivirus
Adware/TVWizard
14.12.27.10

Qihoo 360 Security
HEUR/QVM03.0.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.SmallIslandDevelopment.F
14.12.27.22

Sophos
Generic PUA KO
4.98

Trend Micro House Call
Suspici.A03F5BF4
7.2.361

VIPRE Antivirus
Threat.4784449
35418

File size:
4.4 MB (4,639,752 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/5/2014 10:00:00 PM

Valid to:
2/6/2015 9:59:59 PM

Subject:
CN=Small Island Development, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Small Island Development, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
31A84249503E31798E91715167A83481

File PE Metadata
Compilation timestamp:
6/6/2009 6:41:48 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:pZBqEfGrtyXKH87SUgsotDaobpEI3XYG5GO2R7iMiBRafGrx:pZkEa87SUg5tDaobpEqX8p7ViBRaE

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 3F, 42, 00, E8, F1, 2B, 00, 00, A3, 84, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 36, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security