setup_632.exe

便压安装

Guangxi Nanning Shengtai'an E-Business Development CO.LTD

The application setup_632.exe, “便压安装 ” by Guangxi Nanning Shengtai'an E-Business Development CO.LTD has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup program which is used to install the application. The file has been seen being downloaded from cdn2.wuji.com.
Publisher:
便压  (signed by Guangxi Nanning Shengtai'an E-Business Development CO.LTD)

Product:
便压安装

Description:
便压安装

Version:
1.14.930.1

MD5:
2355a59b353a02a631171d659e9ca547

SHA-1:
c7dd5ea7eb5171db3341bad7ff5edd1415c1dbef

SHA-256:
ab7a3478506571fe27da136370dac2f5f57e5b986304ad6ec7cb175754ba9a28

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/28/2024 7:01:57 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.GuangxiN.Installer (M)
16.4.26.21

File size:
4.3 MB (4,495,160 bytes)

Product version:
1.14.930.1

Copyright:
Copyright (C) 2014

Original file name:
Setup.exe

File type:
Executable application (Win32 EXE)

Language:
Chinese (Simplified, PRC)

Common path:
C:\users\{user}\downloads\setup_632.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/30/2014 8:00:00 AM

Valid to:
5/31/2015 7:59:59 AM

Subject:
CN=Guangxi Nanning Shengtai'an E-Business Development CO.LTD, O=Guangxi Nanning Shengtai'an E-Business Development CO.LTD, L=Guangxi, S=Nanning, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1EB0F4D821E239BA81B3D10E61B7615B

File PE Metadata
Compilation timestamp:
9/30/2014 1:46:35 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
98304:o9MpHhvYzprr/vBHijXUMgBZwcU9hbkBjL2mGTO2+72AeqL//HM:9pHh2nnQpgBZwv9xSky2+77/HM

Entry address:
0x1F368

Entry point:
E8, 68, 78, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 48, 95, 43, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, A4, 91, 43, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, C8, 64, 44, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, CC...
 
[+]

Entropy:
7.9391  (probably packed)

Code size:
222 KB (227,328 bytes)

The file setup_632.exe has been seen being distributed by the following URL.

Remove setup_632.exe - Powered by Reason Core Security