Analysis by: Arvin Roi Macaraeg

ALIASES:

AdWare.Win32.DealPly.ehkgk(KASPERSKY)

 PLATFORM:

Windows

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Potentially Unwanted Application

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

  TECHNICAL DETAILS

File Size: 2,347,592 bytes
File Type: EXE
Memory Resident: No
Initial Samples Received Date: 09 Jan 2019

Arrival Details

This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Potentially Unwanted Application drops the following files:

  • %User Temp%\{Random Characters}.log
  • %User Temp%\inH{Random Numbers}\csshover3.htc
  • %User Temp%\inH{Random Numbers}\form.bmp.Mask
  • %User Temp%\inH{Random Numbers}\css\ie6_main.css
  • %User Temp%\inH{Random Numbers}\css\ie6_main.scss
  • %User Temp%\inH{Random Numbers}\css\main.css
  • %User Temp%\inH{Random Numbers}\css\main.scss
  • %User Temp%\inH{Random Numbers}\css\swAgent.css
  • %User Temp%\inH{Random Numbers}\css\_functions.scss
  • %User Temp%\inH{Random Numbers}\css\_helpers.scss
  • %User Temp%\inH{Random Numbers}\css\_variables.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_align.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_backgrounds.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_border-radius.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_border.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_clearfix.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_colors.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_display.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_float.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_lists.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_margin.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_padding.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_positions.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_typography.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_visibility.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_width-height.scss
  • %User Temp%\inH{Random Numbers}\css\helpers\_z-index.scss
  • %User Temp%\inH{Random Numbers}\css\sdk-ui\_browse.scss
  • %User Temp%\inH{Random Numbers}\css\sdk-ui\_button.scss
  • %User Temp%\inH{Random Numbers}\css\sdk-ui\_checkbox.scss
  • %User Temp%\inH{Random Numbers}\css\sdk-ui\_progress-bar.scss
  • %User Temp%\inH{Random Numbers}\css\sdk-ui\images\button-bg.png
  • %User Temp%\inH{Random Numbers}\css\sdk-ui\images\progress-bg-corner.png
  • %User Temp%\inH{Random Numbers}\css\sdk-ui\images\progress-bg.png
  • %User Temp%\inH{Random Numbers}\css\sdk-ui\images\progress-bg2.png
  • %User Temp%\inH{Random Numbers}\images\ACCEPT_HOVER_updatestartest.png
  • %User Temp%\inH{Random Numbers}\images\ACCEPT_updatestartest.png
  • %User Temp%\inH{Random Numbers}\images\BG.png
  • %User Temp%\inH{Random Numbers}\images\Close.png
  • %User Temp%\inH{Random Numbers}\images\Close_Hover.png
  • %User Temp%\inH{Random Numbers}\images\Color_Button.png
  • %User Temp%\inH{Random Numbers}\images\Color_Button_Hover.png
  • %User Temp%\inH{Random Numbers}\images\DECLINE_HOVER_updatestartest.png
  • %User Temp%\inH{Random Numbers}\images\DECLINE_updatestartest.png
  • %User Temp%\inH{Random Numbers}\images\FINISH_HOVER_updatestartest.png
  • %User Temp%\inH{Random Numbers}\images\FINISH_updatestartest.png
  • %User Temp%\inH{Random Numbers}\images\GENERAL_BG_updatestarframe.png
  • %User Temp%\inH{Random Numbers}\images\Grey_Button.png
  • %User Temp%\inH{Random Numbers}\images\Grey_Button_Hover.png
  • %User Temp%\inH{Random Numbers}\images\Icon_Generic.png
  • %User Temp%\inH{Random Numbers}\images\INSTALL_HOVER_updatestartest.png
  • %User Temp%\inH{Random Numbers}\images\INSTALL_updatestartest.png
  • %User Temp%\inH{Random Numbers}\images\Loader.gif
  • %User Temp%\inH{Random Numbers}\images\NEXT_HOVER_updatestartest.png
  • %User Temp%\inH{Random Numbers}\images\NEXT_updatestartest.png
  • %User Temp%\inH{Random Numbers}\images\Pause_Button.png
  • %User Temp%\inH{Random Numbers}\images\Progress.png
  • %User Temp%\inH{Random Numbers}\images\ProgressBar.png
  • %User Temp%\inH{Random Numbers}\images\Quick_Specs.png
  • %User Temp%\inH{Random Numbers}\images\Resume_Button.png
  • %User Temp%\inH{Random Numbers}\images\sponsored.png
  • %User Temp%\inH{Random Numbers}\libs\localAssests\icc\icc_v5_8.cis
  • %User Temp%\inH{Random Numbers}\libs\localAssests\icut\icut_v2_2.cis
  • %User Temp%\inH{Random Numbers}\locale\DE.locale
  • %User Temp%\inH{Random Numbers}\locale\EN.locale
  • %User Temp%\inH{Random Numbers}\locale\FR.locale
  • %User Temp%\inH{Random Numbers}\locale\JA.locale
  • %User Temp%\inH{Random Numbers}\locale\ZH.locale
  • %User Temp%\in{Random Numbers}\{Random Characters}.tmp
  • %User Temp%\inH{Random Numbers}\bootstrap_{Random Numbers}.html

(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista, 7, and 8.)

Other Details

This Potentially Unwanted Application connects to the following possibly malicious URL:

  • http://{BLOCKED}b.{BLOCKED}eret.com/