setup.exe

TapGamez 2013 LTD

The application setup.exe by TapGamez 2013 has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup and installation application and has been known to bundle potentially unwanted software. The file has been seen being downloaded from 471ez0pf9jwpqv.yuvshu.com. While running, it connects to the Internet address www.ibbalance.com on port 443.
Publisher:
Installer  (signed by TapGamez 2013 LTD)

Product:
Installer

Version:
1.48.0.0

MD5:
8e5e14b74069799fe703333b90c7d7ed

SHA-1:
c37685106c13fa4cd28f6b4094dfd8e2b1a88f3b

SHA-256:
72afdb998f425d46597a17b6a0ddb66a681780ea162134d6ba4c03f7137e2bc3

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/26/2024 5:29:51 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.TapGamez.Installer
17.2.23.9

File size:
409.3 KB (419,136 bytes)

Product version:
1.48.0.0

Copyright:
Copyright (C) 2014

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
12/15/2014 7:00:00 PM

Valid to:
12/16/2015 6:59:59 PM

Subject:
CN=TapGamez 2013 LTD, O=TapGamez 2013 LTD, STREET=1 habarzel st., L=tel aviv, S=israel, PostalCode=69710, C=IL

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00BD65286DA248840F6ECF8F4305066E9F

File PE Metadata
Compilation timestamp:
1/22/2015 12:20:29 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x118D60

Entry point:
60, BE, 00, 70, 4C, 00, 8D, BE, 00, A0, F3, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8930

Packer / compiler:
UPX 2.90LZMA

Code size:
328 KB (335,872 bytes)

The file setup.exe has been seen being distributed by the following URL.

http://471ez0pf9jwpqv.yuvshu.com/.../?p=ZXh0c3lzPTEmYWZmaWQ9MzAzNjkyJmNpZD0xMDAmY3I9MTAwJmxvYz1lbiZzMT0yNDM1JmFmZmlsaWF0ZXJlZmVyZW5jZWlkPTE0MjIyMDAwMTZtYjMxNDY1Nzk1NTkzJmNhbXBpZD0yODI0NTY=&PH87=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

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.softologic.com  (174.37.181.31:80)

TCP (HTTP SSL):
Connects to www.ibbalance.com  (173.192.190.227:443)

TCP (HTTP):

Remove setup.exe - Powered by Reason Core Security