Analysis by: Jaime Benigno Reyes

ALIASES:

AdWare.Win32.InstallCore.f (Kaspersky)

 PLATFORM:

Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Adware

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This adware may be manually installed by a user.

  TECHNICAL DETAILS

File Size: 802,096 bytes
File Type: EXE
Memory Resident: No
Initial Samples Received Date: 26 Aug 2014

Arrival Details

This adware may be manually installed by a user.

Installation

This adware drops the following files:

  • %Program Files%\Tweaks\FileOpener\7z.dll
  • %Program Files%\Tweaks\FileOpener\fileopener.exe
  • %Program Files%\Tweaks\FileOpener\uninstall.exe
  • %User Temp%\is{10-digit number}\{7-digit number}_stp.EXE
  • %User Temp%\is{10-digit number}\{7-digit number}_stp.EXE.part
  • %All Users Profile%\Microsoft\Windows\Start Menu\Programs\FileOpener (Windows Vista and higher versions)
  • %All Users Profile%\Microsoft\Windows\Start Menu\Programs\FileOpener\FileOpener.lnk (Windows Vista and higher versions)
  • %All Users Profile%\Microsoft\Windows\Start Menu\Programs\FileOpener\uninstall.lnk (Windows Vista and higher versions)
  • %System Root%\Users\Public\Desktop\FileOpener.lnk (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\1DAF2884EC4DFA96BA4A58D4DBC9C406 (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771 (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\4309200C3DBAD0F6F0DFACE9165FD092 (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\49514950C94E8026A2B06312597DFF49_569BD946168DB279A65378F7D088CFD0 (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\4997483CBD49861D6724DB29797AB22C_458D4C6BAE4D25B811086B585FFD701D (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\8059E9A0D314877E40FE93D8CCFB3C69_DDFBEA63B17F0C1BF12B1E83E3936D7B (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\AC9005F5466BD463DF06D711B370595F (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\1DAF2884EC4DFA96BA4A58D4DBC9C406 (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771 (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\4309200C3DBAD0F6F0DFACE9165FD092 (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\49514950C94E8026A2B06312597DFF49_569BD946168DB279A65378F7D088CFD0 (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\4997483CBD49861D6724DB29797AB22C_458D4C6BAE4D25B811086B585FFD701D (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\8059E9A0D314877E40FE93D8CCFB3C69_DDFBEA63B17F0C1BF12B1E83E3936D7B (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\AC9005F5466BD463DF06D711B370595F (Windows Vista and higher versions)
  • %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D (Windows Vista and higher versions)
  • %All Users Profile%\Desktop\FileOpener.lnk (Versions lower than Windows Vista)
  • %All Users Profile%\Start Menu\Programs\FileOpener (Versions lower than Windows Vista)
  • %All Users Profile%\Start Menu\Programs\FileOpener\FileOpener.lnk (Versions lower than Windows Vista)
  • %All Users Profile%\Start Menu\Programs\FileOpener\uninstall.lnk (Versions lower than Windows Vista)
  • %Application Data%\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (Versions lower than Windows Vista)
  • %Application Data%\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (Versions lower than Windows Vista)
  • %Application Data%\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (Versions lower than Windows Vista)
  • %Application Data%\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (Versions lower than Windows Vista)

(Note: %Program Files% is the default Program Files folder, usually C:\Program Files in Windows 2000, Server 2003, and XP (32-bit), Vista (32-bit), and 7 (32-bit), or C:\Program Files (x86) in Windows XP (64-bit), Vista (64-bit), and 7 (64-bit).. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.. %All Users Profile% is the All Users or Common profile folder, which is C:\Documents and Settings\All Users in Windows 2000, XP, and Server 2003, and C:\ProgramData in Windows Vista and 7.. %System Root% is the root folder, which is usually C:\. It is also where the operating system is located.. %AppDataLocalLow% is the LocalLow Application Data folder, which is usually C:\Users\{user name}\AppData\LocalLow on Windows Vista and 7.. %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.)

It creates the following folders:

  • %Program Files%\Tweaks
  • %Program Files%\Tweaks\FileOpener
  • %User Temp%\is{10-digit number}

(Note: %Program Files% is the default Program Files folder, usually C:\Program Files in Windows 2000, Server 2003, and XP (32-bit), Vista (32-bit), and 7 (32-bit), or C:\Program Files (x86) in Windows XP (64-bit), Vista (64-bit), and 7 (64-bit).. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)

Other System Modifications

This adware adds the following registry keys:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
2796BAE63F1801E277261BA0D77770028F20EEE4

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
91C6D6EE3E8AC86384E548C299295C756C817B81 (Windows Vista and higher versions)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
D4DE20D05E66FC53FE1A50882C78DB2852CAE474 (Windows Vista and higher versions)

It adds the following registry entries:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
2796BAE63F1801E277261BA0D77770028F20EEE4
Blob = "{hex value}"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
91C6D6EE3E8AC86384E548C299295C756C817B81
Blob = "{hex value}" (Windows Vista and higher versions)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
D4DE20D05E66FC53FE1A50882C78DB2852CAE474
Blob = "{hex value}" (Windows Vista and higher versions)

Other Details

This adware adds the following registry entries to add an uninstall option to the Control Panel:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
DisplayName = "FileOpener"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
UninstallString = ""%Program Files%\Tweaks\FileOpener\uninstall.exe""

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
QuietUninstallString = ""%Program Files%\Tweaks\FileOpener\uninstall.exe" /S"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
InstallLocation = ""%Program Files%\Tweaks\FileOpener""

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
DisplayIcon = ""%Program Files%\Tweaks\FileOpener\fileopener.exe""

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
Publisher = "Tweaks"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
HelpLink = "http://{BLOCKED}le-opener.com/uninstall.html"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
URLUpdateInfo = "http://{BLOCKED}ile-opener"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
URLInfoAbout = "http://{BLOCKED}ile-opener"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
DisplayVersion = "1.1.1"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
AlsoInstalled = ""

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
VersionMajor = "1"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
VersionMinor = "1"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
NoModify = "1"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
NoRepair = "1"

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
EstimatedSize = "16233"

It connects to the following possibly malicious URL:

  • http://{BLOCKED}76.74.176.175
  • http://{BLOCKED}ds.adsrvmedia.net
  • http://{BLOCKED}dsrvmedia.adk2.co
  • http://{BLOCKED}fs.googleusercontent.com
  • http://{BLOCKED}jax.googleapis.com
  • http://{BLOCKED}jax.googleapis.com:443
  • http://{BLOCKED}dn.adapd.com
  • http://{BLOCKED}dn.adk2.co:443
  • http://{BLOCKED}dn.adsrvmedia.com
  • http://{BLOCKED}dn.adsrvmedia.net
  • http://{BLOCKED}dn.delivery49.com
  • http://{BLOCKED}dp1.public-trust.com
  • http://{BLOCKED}lients1.google.com
  • http://{BLOCKED}ounter.d.adapd.com
  • http://{BLOCKED}ounter.d.delivery49.com
  • http://{BLOCKED}rl.geotrust.com
  • http://{BLOCKED}rl.microsoft.com
  • http://{BLOCKED}.adapd.com
  • http://{BLOCKED}.delivery49.com
  • http://{BLOCKED}p.g.doubleclick.net
  • http://{BLOCKED}oogleads.g.doubleclick.net
  • http://{BLOCKED}tglobal-ocsp.geotrust.com
  • http://{BLOCKED}mg.coolvideoconverter.com
  • http://{BLOCKED}scrl.microsoft.com
  • http://{BLOCKED}csp.godaddy.com
  • http://{BLOCKED}s.fileopenerapp.com
  • http://{BLOCKED}s2.fileopenerapp.com
  • http://{BLOCKED}eturn.uk.domainnamesales.com
  • http://{BLOCKED}p.fileopenerapp.com
  • http://{BLOCKED}3.amazonaws.com
  • http://{BLOCKED}tatic.thefileopenerapp.com
  • http://www.{BLOCKED}srvmedia.com
  • http://www.{BLOCKED}wnload.windowsupdate.com
  • http://www.{BLOCKED}ogle.com
  • http://www.{BLOCKED}ogleadservices.com
  • http://www.{BLOCKED}tatic.com
  • http://www.{BLOCKED}efileopenerapp.com