not-a-virus:AdWare.Win32.BetterSurf.b (Kaspersky), Gen:Variant.Adware.Graftor.125844 (B) (Emsisoft), Gen:Variant.Adware.Graftor.125844 (AdAware)Behaviour: Adware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 9b8588a8c405140d52cc8e0fcac5da75
SHA1: 5cc218a8a6416672a2003d029aa333089859eb9a
SHA256: 57251a970fab166739ff92cb8f4ac62ea02d5099cd794d368b95b6180e129abe
SSDeep: 1536:jhMWCsgyMIwPnt6hp1ZcTkrC5vCTfLlQwPsKS:aWKyMIwPt6hp1ivgawPs3
Size: 87552 bytes
File type: DLL
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2014-05-13 15:56:04
Analyzed on: WindowsXP SP3 32-bit
Summary: Adware. Delivers advertising content in a manner or context that may be unexpected and unwanted by users. Many adware applications also perform tracking functions. Users may want to remove adware if they object to such tracking, do not wish to see the advertising caused by the program or are frustrated by its effects on system performance.
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The PUP creates the following process(es):
regsvr32.exe:1276
The PUP injects its code into the following process(es):No processes have been created.
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
No files have been created.
Registry activity
The process regsvr32.exe:1276 makes changes in the system registry.
The PUP creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "77 C6 14 34 73 CC 4D 98 59 9F 5C 21 8F 44 49 43"
[HKCR\TypeLib\{E96FC367-4333-44D6-8AD1-C56FE397AF4F}\1.1\0\win32]
"(Default)" = "c:\9b8588a8c405140d52cc8e0fcac5da75.dll"
[HKCR\Interface\{10BB0B78-98A7-4816-8BAB-25F460EB6F28}\ProxyStubClsid32]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\Interface\{10BB0B78-98A7-4816-8BAB-25F460EB6F28}\TypeLib]
"Version" = "1.1"
[HKCR\CLSID\{725bb89c-a827-4ee5-a558-313c204fd357}\TypeLib]
"(Default)" = "{e96fc367-4333-44d6-8ad1-c56fe397af4f}"
[HKCR\CLSID\{725bb89c-a827-4ee5-a558-313c204fd357}]
"(Default)" = "RichMediaViewV1release1300"
[HKCR\TypeLib\{E96FC367-4333-44D6-8AD1-C56FE397AF4F}\1.1]
"(Default)" = "RichMediaViewV1release1300Lib"
[HKCR\Interface\{10BB0B78-98A7-4816-8BAB-25F460EB6F28}\TypeLib]
"(Default)" = "{E96FC367-4333-44D6-8AD1-C56FE397AF4F}"
[HKCR\Interface\{10BB0B78-98A7-4816-8BAB-25F460EB6F28}]
"(Default)" = "IRichMediaViewV1release1300BHO"
[HKCR\CLSID\{725bb89c-a827-4ee5-a558-313c204fd357}\InprocServer32]
"(Default)" = "c:\9b8588a8c405140d52cc8e0fcac5da75.dll"
[HKCR\TypeLib\{E96FC367-4333-44D6-8AD1-C56FE397AF4F}\1.1\FLAGS]
"(Default)" = "0"
[HKCR\TypeLib\{E96FC367-4333-44D6-8AD1-C56FE397AF4F}\1.1\HELPDIR]
"(Default)" = "c:"
[HKCR\Interface\{10BB0B78-98A7-4816-8BAB-25F460EB6F28}\ProxyStubClsid]
"(Default)" = "{00020424-0000-0000-C000-000000000046}"
[HKCR\CLSID\{725bb89c-a827-4ee5-a558-313c204fd357}\Version]
"(Default)" = "1.1"
[HKCR\CLSID\{725bb89c-a827-4ee5-a558-313c204fd357}\InprocServer32]
"ThreadingModel" = "Apartment"
It registers itself as a Browser Helper Object (BHO) to ensure its automatic execution every time Internet Explorer is run. It does this by creating the following registry key(s)/entry(ies):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{725bb89c-a827-4ee5-a558-313c204fd357}]
"NoExplorer" = "1"
"(Default)" = "RichMediaViewV1release1300"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
regsvr32.exe:1276
- Delete the original PUP file.
Static Analysis
VersionInfo
Company Name:
Product Name: Rich Media View release 1300
Product Version: 1.0.0.1
Legal Copyright: (c) 2012-2014. All rights reserved.
Legal Trademarks:
Original Filename: RichMediaViewV1release1300.dll
Internal Name: RichMediaViewV1release1300.dll
File Version: 1.0.0.1
File Description: Rich Media View
Comments:
Language: English (United States)
Company Name: Product Name: Rich Media View release 1300Product Version: 1.0.0.1Legal Copyright: (c) 2012-2014. All rights reserved.Legal Trademarks: Original Filename: RichMediaViewV1release1300.dllInternal Name: RichMediaViewV1release1300.dllFile Version: 1.0.0.1File Description: Rich Media ViewComments: Language: English (United States)
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.text | 4096 | 50066 | 50176 | 4.50852 | e8e6e80479bd51e43249b21f7834aab0 |
.rdata | 57344 | 19340 | 19456 | 3.29418 | d1933defc3e79ddfc7eb3297c570e57c |
.data | 77824 | 8704 | 5120 | 2.74377 | 7f5746165e5b298b30b3bf5efd44f00c |
.rsrc | 90112 | 4156 | 4608 | 3.28576 | e4e1fcb5364c701c2037e3b90ea757a1 |
.reloc | 98304 | 6828 | 7168 | 3.26496 | e5698cb97112dc1e5dd275f0037ae0e6 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Network Activity
URLs
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Map
The PUP connects to the servers at the folowing location(s):