webcake.exe

KBM2 Installer

sterkly LLC

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application webcake.exe by sterkly has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software. The file has been seen being downloaded from api.kbm2.com.
Publisher:
sterkly LLC  (signed and verified)

Product:
KBM2 Installer

Version:
2.5.1.0

MD5:
ad012fc7f752d6c903ca34ab5e370518

SHA-1:
c16a21e56cfc27fdbf96372f24bdcf316c54b7df

SHA-256:
7664440a6ef0060a595c312910ca4d55b2a1b9bd938a87b7d37a943bf3e39c0d

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
11/23/2024 3:33:35 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo.sterkly.Installer (M)
16.3.6.19

File size:
541.6 KB (554,616 bytes)

Product version:
2.5.1.0

Copyright:
(c) Sterkly LLC. All rights reserved.

Original file name:
KBM2.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States d'America)

Common path:
C:\users\{user}\downloads\webcake.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/22/2013 1:00:00 AM

Valid to:
2/22/2015 12:59:59 AM

Subject:
CN=sterkly LLC, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=sterkly LLC, L=Carlsbad, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
113C6B2C72DEF110BE64B2ABBC52861E

File PE Metadata
Compilation timestamp:
6/20/2013 9:46:31 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:9Tq6uX5c0RzWguzZylIAllGVytvHdKme7IZhpY6Qi5:92610ZluglqytYmesZh5QY

Entry address:
0x3A3C0

Entry point:
E8, 0E, 6F, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, D0, 0B, 47, 00, 75, 02, F3, C3, E9, 95, 6F, 00, 00, 8B, FF, 55, 8B, EC, 56, 8B, 75, 14, 85, F6, 75, 04, 33, C0, EB, 61, 83, 7D, 08, 00, 75, 13, E8, D9, 35, 00, 00, 6A, 16, 5E, 89, 30, E8, 6C, 75, 00, 00, 8B, C6, EB, 48, 83, 7D, 10, 00, 74, 16, 39, 75, 0C, 72, 11, 56, FF, 75, 10, FF, 75, 08, E8, 66, 70, 00, 00, 83, C4, 0C, EB, C7, FF, 75, 0C, 6A, 00, FF, 75, 08, E8, B4, 31, 00, 00, 83, C4, 0C, 83, 7D, 10, 00, 74, BB, 39, 75, 0C, 73, 0E, E8, 8F, 35, 00, 00, 6A...
 
[+]

Code size:
342.5 KB (350,720 bytes)

The file webcake.exe has been seen being distributed by the following URL.

http://api.kbm2.com/downloadLauncher.ashx?cid=652

Remove webcake.exe - Powered by Reason Core Security