PUP.Coupons

Analysis Report

General information

Family Name: PUP.Coupons
Signature status: Root Not Trusted

Known Samples

MD5: 979718980ae23e83e934bef1b26c2ccd
SHA1: 16d821a3006fea176affcc9a685f7591185a7db2
SHA256: E0CFA96D0D00E5004A476A8F3EA934630F157D4D8A778CE01A3976E78078950E
File Size: 1.28 MB, 1277608 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments Created with Setup Factory 7.0
File Description Setup Application
File Version 7.0.6.1
Internal Name suf70_launch
Legal Copyright Setup Engine Copyright © 2004-2006 Indigo Rose Corporation
Legal Trademarks Setup Factory is a trademark of Indigo Rose Corporation.
Original Filename suf70_launch.exe
Product Name Setup Factory 7.0 Runtime
Product Version 7.0.6.1

Digital Signatures

Signer Root Status
Coupons, Inc. VeriSign Class 3 Code Signing 2004 CA Root Not Trusted

Block Information

Total Blocks: 115
Potentially Malicious Blocks: 0
Whitelisted Blocks: 115
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\coupons.ico Generic Read,Write Attributes
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\coupons.ico Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irimg1.jpg Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irimg2.jpg Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irimg3.jpg Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irimg4.jpg Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irimg5.jpg Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irimg6.jpg Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irimg7.jpg Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irimg8.jpg Generic Read,Write Data,Write Attributes,Write extended,Append data
Show More
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irsetup.dat Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irsetup.dat Synchronize,Write Attributes
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\irsetup.exe Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\verdana_1.fon Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\_ir_sf7_temp_0\verdana_1.tft Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Other Suspicious
  • SetWindowsHookEx

Shell Command Execution

C:\Users\Waapfukn\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe __IRAOFF:543245 "__IRAFN:c:\users\user\downloads\16d821a3006fea176affcc9a685f7591185a7db2_0001277608"

Related Posts

Trending

Most Viewed

Loading...