teamviewersetup.exe

Internet

SuperMoca (New Media Holdings Ltd.)

The application teamviewersetup.exe, “Internet Setup ” by SuperMoca (New Media Holdings) has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the installCore installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from www.filenewfactory.com and multiple other hosts.
Publisher:
Installer   (signed by SuperMoca (New Media Holdings Ltd.))

Product:
Internet

Description:
Internet Setup

Version:
4.1.5.4

MD5:
978eb0775ff0aac0e346ec7d60f32b0f

SHA-1:
0659d883d76ff3ecaeaebd755555e4d7b9a84c49

SHA-256:
b45f6f5b6e8c20270aae72850dc3bb66f650939b033d8abb3bbe7eb3f4a251a3

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/6/2024 12:45:01 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.NewMedia.Installer.Installer (M)
16.1.22.11

File size:
885.4 KB (906,608 bytes)

Product version:
3.2

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\teamviewersetup.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
12/17/2015 11:18:05 AM

Valid to:
3/23/2016 11:24:07 AM

Subject:
CN=SuperMoca (New Media Holdings Ltd.), O=SuperMoca (New Media Holdings Ltd.), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121DDA99F01EE6D7FC1C948433B608BFC09

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:pQ8S0DAuzck3J7JJq0a7psH0iG65wvbF+alZgOF5u:p7VMul51O7psS65wjc2ZLu

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, BF, A9, FF, FF, E8, 5E, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.9361

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file teamviewersetup.exe has been seen being distributed by the following 2 URLs.

http://www.filenewfactory.com/c?x=r4UkFuUGuYEv7RgPQy7Tk8ZC3rEPaDGAzDYgflk Hww=&c=pyoD6tUVfNPAo9lOrmBYwWRqZieuR98JsMpNwL32t8HERhftJYQ0yLAnyp8b2RqLMMV4nGqDzwESHBFxDudF6wkI/m4zo3aY1jYL1FiekSIXKPxnOgQj69lIPjFuMiL3&downloadAs=TeamViewerSetup.exe&fallback_url=http://allmyapps.com/binary/653/.../direct-download?token=90c4f1d505d730885cc98010575156fddefdb54b

Remove teamviewersetup.exe - Powered by Reason Core Security