u1404.exe

Ultrareach Internet Corp.

The application u1404.exe by Ultrareach Internet has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup program which is used to install the application. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘U1404’. This executable runs as a local area network (LAN) Internet proxy server listening on port 9666 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host.
Publisher:
Ultrareach Internet Corp.  (signed and verified)

MD5:
96277ff94da577cfcbc72568cb43cfd7

SHA-1:
fe9efaaf1879e37eaf42166b484f32142e65af64

SHA-256:
8fd612fddc0cd96a481f445c9862ec92c47da96652ccf1105ade871493a54ce7

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/16/2024 3:43:59 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Optional.UltrareachInternetCorp.F
14.9.24.11

File size:
2 MB (2,111,200 bytes)

File type:
Executable application (Win32 EXE)

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
12/6/2012 1:33:59 AM

Valid to:
1/11/2016 7:34:39 PM

Subject:
CN=Ultrareach Internet Corp., O=Ultrareach Internet Corp., L=Cheyenne, S=WY, C=US

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121C51978F0ED636CA3C5B5C4D33D022C10

File PE Metadata
Compilation timestamp:
9/22/2014 5:59:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
49152:0NtV7H75U78IdqbPre24vWaLU7kQRCmJU7:0NHD7Jg+re2Vgbr

Entry address:
0x855000

Entry point:
56, 50, 53, E8, 01, 00, 00, 00, CC, 58, 89, C3, 40, 2D, 00, 30, 0F, 00, 2D, 00, 82, 0C, 10, 05, F7, 81, 0C, 10, 80, 3B, CC, 75, 19, C6, 03, 00, BB, 00, 10, 00, 00, 68, F0, 53, AB, 58, 68, 03, 78, B6, 15, 53, 50, E8, 0A, 00, 00, 00, 83, C0, 00, 89, 44, 24, 08, 5B, 58, C3, 55, 89, E5, 50, 53, 51, 56, 8B, 75, 08, 8B, 4D, 0C, C1, E9, 02, 8B, 45, 10, 8B, 5D, 14, 85, C9, 74, 0A, 31, 06, 01, 1E, 83, C6, 04, 49, EB, F2, 5E, 59, 5B, 58, C9, C2, 10, 00, B9, B4, 61, 76, 73, BE, 5C, 95, 0E, 5A, 79, 17, 6F, EF, AF, 7D...
 
[+]

Entropy:
7.9476  (probably packed)

Code size:
924 KB (946,176 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:9666/

Local host port:
9666

Default credentials:
No


Scheduled Task
Task name:
{77C0DDEB-4C81-49F5-9806-AC2EC58E5AA7}

Trigger:
Registration (Runs on registration)


Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
U1404

Command:
"C:\Program Files\ultrasurf\u1404.exe"


Windows Firewall Allowed Program
Name:
D:\Documents and Settings\igarni\Bureau\U1404.exe


The file u1404.exe has been seen being distributed by the following 2 URLs.

http://download1274.mediafire.com/ad9083rh3h1g/.../U1404.exe

http://chph.softwaretop.net/2014/.../ultrasurf.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to server-52-85-77-14.lax3.r.cloudfront.net  (52.85.77.14:443)

TCP (HTTP SSL):
Connects to server-52-85-77-105.lax3.r.cloudfront.net  (52.85.77.105:443)

TCP (HTTP SSL):
Connects to server-52-85-77-21.lax3.r.cloudfront.net  (52.85.77.21:443)

TCP (HTTP SSL):
Connects to server-52-85-77-10.lax3.r.cloudfront.net  (52.85.77.10:443)

TCP (HTTP SSL):
Connects to s3-ap-northeast-1.amazonaws.com  (52.219.68.112:443)

TCP (HTTP SSL):
Connects to s3-1.amazonaws.com  (54.231.40.202:443)

TCP (HTTP SSL):
Connects to server-52-85-77-128.lax3.r.cloudfront.net  (52.85.77.128:443)

TCP (HTTP SSL):
Connects to s3-ap-southeast-1.amazonaws.com  (52.219.40.1:443)

TCP (HTTP SSL):
Connects to server-52-85-77-80.lax3.r.cloudfront.net  (52.85.77.80:443)

TCP (HTTP SSL):
Connects to server-52-85-77-224.lax3.r.cloudfront.net  (52.85.77.224:443)

TCP (HTTP SSL):
Connects to server-54-230-216-21.mrs50.r.cloudfront.net  (54.230.216.21:443)

TCP (HTTP SSL):
Connects to server-54-192-29-113.dub2.r.cloudfront.net  (54.192.29.113:443)

TCP (HTTP SSL):
Connects to grokhawthorn.com  (199.114.221.19:443)

TCP (HTTP):
Connects to any-in-2678.1e100.net  (216.239.38.120:80)

TCP (HTTP SSL):
Connects to server-54-230-81-31.mia50.r.cloudfront.net  (54.230.81.31:443)

TCP (HTTP SSL):
Connects to server-54-230-5-172.dfw3.r.cloudfront.net  (54.230.5.172:443)

TCP (HTTP SSL):
Connects to server-54-192-25-232.mxp4.r.cloudfront.net  (54.192.25.232:443)

TCP (HTTP SSL):
Connects to server-54-192-25-192.mxp4.r.cloudfront.net  (54.192.25.192:443)

TCP (HTTP SSL):
Connects to server-54-192-19-42.iad12.r.cloudfront.net  (54.192.19.42:443)

TCP (HTTP SSL):
Connects to server-54-192-130-8.ams50.r.cloudfront.net  (54.192.130.8:443)

Remove u1404.exe - Powered by Reason Core Security