setup.exe

File Monarch

This is published and distributed via an Adknowledge's advertising supported (adware) software installer. The application setup.exe, “System Applet ” by File Monarch has been detected as adware by 41 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. The file has been seen being downloaded from t.cttsrv.com.
Publisher:
System Applet   (signed by File Monarch)

Product:
System Applet

Description:
System Applet

Version:
2.4.8.1

MD5:
75cc8dca28d7c851a811076735d2d059

SHA-1:
a536c8c50f1949f4daadf34413a8cca4c73e0739

SHA-256:
3fbd60a4d8f0ec5e105c2b69a483c21796dba49accaf965d844ea813cd438c48

Scanner detections:
41 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 5:47:00 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.iBryte.6
649

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
PUP/Win32.Agent
2014.08.21

Avira AntiVirus
Adware/iBryte.6.2
7.11.168.120

avast!
Win32:IBryte-EE [PUP]
2014.9-150427

AVG
Adware AdPlugin.YV
2014.0.4311

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.15427

Bitdefender
Gen:Variant.Adware.iBryte.6
1.0.20.585

Bkav FE
W32.VikesluLTAH.Adware
1.3.0.4959

Clam AntiVirus
Win.Adware.Ibryte-2275
0.98/20230

Comodo Security
Application.Win32.AgentCV.HWYE
19262

Dr.Web
Adware.Downware.6420
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.iBryte
8.15.04.27.03

ESET NOD32
Win32/AdWare.iBryte.AX application
9.7.0.302.0

Fortinet FortiGate
W32/Zbot.AAN!tr
4/27/2015

F-Prot
W32/A-6814c67e
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.iBryte
11.2015-27-04_2

G Data
Gen:Variant.Adware.iBryte
15.4.24

herdProtect (fuzzy)
2015.7.27.18

IKARUS anti.virus
Trojan.Win32.Buzus
t3scan.1.7.5.0

K7 AntiVirus
Unwanted-Program
13.183.13113

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.2129

Malwarebytes
PUP.Optional.iBryte
v2015.04.27.03

McAfee
Trojan.Artemis!E068D8976EE1
5600.6783

MicroWorld eScan
Gen:Variant.Adware.iBryte.6
16.0.0.351

NANO AntiVirus
Trojan.Win32.Buzus.ddrwws
0.28.2.61721

Norman
Gen:Variant.Adware.iBryte.6
03.12.2014 13:20:04

nProtect
Adware.IBryte.AD
14.08.13.01

Panda Antivirus
Trj/Genetic.gen
15.04.27.03

Qihoo 360 Security
Malware.Radar03.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
4.15.14.00

Reason Heuristics
Threat.Adknowledge.Installer
15.4.26.23

Rising Antivirus
PE:Malware.iBryte!6.197B
23.00.65.15425

Total Defense
Win32/Tnega.XABfAXD
37.0.10836

Trend Micro House Call
Suspicious_GEN.F47V0717
7.2.117

Trend Micro
TROJ_GEN.R00UC0EJE14
10.465.27

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4150696
32210

Zillya! Antivirus
Adware.iBryte.Win32.923
2.0.0.1835

File size:
161.9 KB (165,752 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) System Applet

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/17/2014 8:00:00 PM

Valid to:
3/18/2015 7:59:59 PM

Subject:
CN=File Monarch, O=File Monarch, STREET="4600 Madison Ave., FL 10", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E65C750985B066CBB7B485ACF86E58B1

File PE Metadata
Compilation timestamp:
8/6/2014 3:37:42 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
1536:VkdAARHi2B33O39wHRihnWW8LalY4o8ddqKtBWYM4AuZg2Ux1n6HDTD:VkOyHi2t3O3y6WxKt4YM/Zxx8/

Entry address:
0x5D0D

Entry point:
E8, 46, 05, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 08, A2, 40, 00, 89, 0D, 04, A2, 40, 00, 89, 15, 00, A2, 40, 00, 89, 1D, FC, A1, 40, 00, 89, 35, F8, A1, 40, 00, 89, 3D, F4, A1, 40, 00, 66, 8C, 15, 20, A2, 40, 00, 66, 8C, 0D, 14, A2, 40, 00, 66, 8C, 1D, F0, A1, 40, 00, 66, 8C, 05, EC, A1, 40, 00, 66, 8C, 25, E8, A1, 40, 00, 66, 8C, 2D, E4, A1, 40, 00, 9C, 8F, 05, 18, A2, 40, 00, 8B, 45, 00, A3, 0C, A2, 40, 00, 8B, 45, 04, A3, 10, A2, 40, 00, 8D, 45, 08, A3, 1C, A2, 40...
 
[+]

Entropy:
4.2759

Code size:
23 KB (23,552 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security