tmp00000002ba273a98ba91a1b9

Desktop.Phoenix

Web Cake

This file is part of the Web Cake web browser extension, an adware plugin for various web browsers designed to deliver context based advertising injected directly in the web pages a user is viewing as well opens advertisements that appear independently outside the context of the program, website, or other source the advertisements are promoting. The file tmp00000002ba273a98ba91a1b9 by Web Cake has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is part of the Yontoo branded browser-extension.
Publisher:
Microsoft  (signed by Web Cake)

Product:
Desktop.Phoenix

Version:
1.0.0.16

MD5:
c99806e5456d0af82f656c276e42487a

SHA-1:
d4579f80241287879cfeef0f0b031e4e04a40d3e

SHA-256:
87346bcb5da97c1160d5453ea02a00598dd8a77a6f8ed0b161427343cc8446ab

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
11/23/2024 3:20:02 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
16.11.10.18

File size:
512 KB (524,288 bytes)

Product version:
1.0.0.16

Copyright:
Copyright © Microsoft 2013

Original file name:
Desktop.Phoenix.dll

Language:
Language Neutral

Common path:
C:\windows\temp\tmp00000002ba273a98ba91a1b9

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/9/2013 5:30:00 AM

Valid to:
4/10/2015 5:29:59 AM

Subject:
CN=Web Cake, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Web Cake, L=Carlsbad, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
06B9035EE5A556582D9427CC2C8DD0BC

File PE Metadata
Compilation timestamp:
7/23/2013 6:16:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:XZPmLOH02JoPygUZlu2BpLiPwlUfIKKuioD4LP22dwf:XnllsQUfIKKuZAP2

Entry address:
0x6BB9D

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 10, 00, 00, 00, 18, 00, 00, 80, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.1939

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
423 KB (433,152 bytes)

Remove tmp00000002ba273a98ba91a1b9 - Powered by Reason Core Security