bmlwlselb.exe

Secure Web

Big Water Applications, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The application bmlwlselb.exe, “SecureWeb Service” by Big Water Applications has been detected as adware by 7 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “BmlWlseLb”. According to AVG, this software downloads additional adware offers during setup.
Publisher:
Big Water Applications, LLC  (signed and verified)

Product:
Secure Web

Description:
SecureWeb Service

Version:
1.0.0.0

MD5:
63f138fd3f3419760792a3a908971211

SHA-1:
bfc86534872b6b2a79d4769f971bee67f19c69cb

SHA-256:
c8f20119739b633acf453b0f241705b4e410c70585a50640fd71c0b3463d5555

Scanner detections:
7 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
11/27/2024 6:19:13 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/Adware.Gen7
8.3.1.6

AVG
Potentially harmful program Downloader.BSH
2014.0.4311

Baidu Antivirus
Adware.MSIL.PullUpdate
4.0.3.15518

ESET NOD32
MSIL/Adware.PullUpdate.G.gen application
7.0.302.0

Malwarebytes
PUP.Optional.SecureWeb.A
v2015.05.18.08

NANO AntiVirus
Trojan.Win32.Downware.dhdcgg
0.30.24.1357

Reason Heuristics
Threat.Injekt.BigWaterApplications
15.5.18.4

File size:
2.2 MB (2,322,248 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Big Water Applications, LLC 2014

Original file name:
SecureWebService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\uuweyjq\bmlwlselb.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/27/2014 7:00:00 PM

Valid to:
5/28/2015 6:59:59 PM

Subject:
CN="Big Water Applications, LLC", O="Big Water Applications, LLC", L=La Jolla, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0C8B8C8404BDAF0C09C54486BDE81E2C

File PE Metadata
Compilation timestamp:
10/1/2014 8:45:34 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
49152:32eFAmZlVrh5y5huXE8zIXT3NQ02aKM7s4Vq2OeOODvVvHm:32eHXX5yK2T9T1Kt48nODo

Entry address:
0x2368AE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.9992

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.2 MB (2,312,704 bytes)

Service
Display name:
BmlWlseLb

Type:
Win32OwnProcess

Depends on:
Winmgmt CryptSvc


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ec2-52-10-180-179.us-west-2.compute.amazonaws.com  (52.10.180.179:80)

Remove bmlwlselb.exe - Powered by Reason Core Security