ytd_sysmenu_setup.exe

Goobzo LTD

The application ytd_sysmenu_setup.exe by Goobzo has been detected as adware by 14 anti-malware scanners. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address server-54-230-51-98.jfk5.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Goobzo LTD  (signed and verified)

Version:
1.9.0.999

MD5:
7b86de75ccd9c87eba364c3d3cd99acc

SHA-1:
19d758dfa7bfd37ddca6506b8611e67718688168

SHA-256:
9bb7e464abb2bf0748f94f4a3ce40234035e8833f975e8dd6f5c7ab275048386

Scanner detections:
14 / 68

Status:
Adware

Analysis date:
11/24/2024 6:33:24 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Win-PUP/CrossRider
2014.10.23

Avira AntiVirus
ADWARE/CrossRider.Gen
7.11.180.204

AVG
Skodna
2015.0.3304

Baidu Antivirus
Adware.Win32.CrossAd
4.0.3.141031

Dr.Web
Adware.Downware.8569
9.0.1.0304

ESET NOD32
Win32/SpeedBit (variant)
8.10606

Fortinet FortiGate
Riskware/SpeedBit
10/31/2014

G Data
Win32.Application.Shopperpro
14.10.24

K7 AntiVirus
Trojan
13.184.13741

Malwarebytes
PUP.Optional.Goobzo
v2014.10.31.04

McAfee
Artemis!7B86DE75CCD9
5600.6960

Reason Heuristics
PUP.Installer.Goobzo.R
14.10.31.15

Sophos
Generic PUA BJ
4.98

VIPRE Antivirus
Goobzo
34170

File size:
1.1 MB (1,129,856 bytes)

Product version:
1.9.0.999

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\users\{user}\appdata\local\temp\ytd_sysmenu_setup.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
5/1/2013 5:00:00 PM

Valid to:
5/2/2015 4:59:59 PM

Subject:
CN=Goobzo LTD, O=Goobzo LTD, L=Haifa, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
120B25DDE57B88636AD4D97D23B99C88

File PE Metadata
Compilation timestamp:
10/6/2014 5:01:29 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
24576:LBF3xgJsCcJK/qOl8uyl4vb8P5+r1PojTtUWrfoReLX+:yJsCiLW874vb8Pwr1gPtUWToReLX+

Entry address:
0x50B66

Entry point:
E8, B7, D3, 00, 00, E9, 7F, FE, FF, FF, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, 48, D7, 4C, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 70, A7, 4C, 00, 01, 0F, 82, F6, D4, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83, E2, 03, C1, E9, 02, 74, 06, F3...
 
[+]

Entropy:
6.6485

Code size:
589 KB (603,136 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to server-54-230-51-98.jfk5.r.cloudfront.net  (54.230.51.98:80)

TCP (HTTP):
Connects to server-54-230-51-42.jfk5.r.cloudfront.net  (54.230.51.42:80)

TCP (HTTP):
Connects to server-54-230-51-157.jfk5.r.cloudfront.net  (54.230.51.157:80)

TCP (HTTP):
Connects to server-52-85-167-16.gig50.r.cloudfront.net  (52.85.167.16:80)

Remove ytd_sysmenu_setup.exe - Powered by Reason Core Security