{67c662df-ee30-43f3-a32d-6c1a5a35a202}gw.sys

BooZaka

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {67c662df-ee30-43f3-a32d-6c1a5a35a202}gw.sys by BooZaka has been detected as adware by 10 anti-malware scanners. It runs as a Windows kernel mode device driver named “{67c662df-ee30-43f3-a32d-6c1a5a35a202}Gw”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by BooZaka)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
2fe47fd5c2b952ac166e8f8f551b62aa

SHA-1:
0bcf4329cd1b192bcc0b30c1c1a1f6de49bc3a89

SHA-256:
aaed7c9f07255931f4ab772f4fdbfbf3fb1228d659430e607216384dc044a54d

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/20/2024 2:08:19 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Yotoon
7.1.1

AVG
Generic
2016.0.3219

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15125

Dr.Web
Trojan.BPlug.123
9.0.1.025

McAfee
Artemis!2FE47FD5C2B9
5600.6875

NANO AntiVirus
Riskware.Win32.Yotoon.ddghtt
0.28.2.61942

Reason Heuristics
PUP.Yontoo
15.1.25.3

Trend Micro House Call
Suspicious_GEN.F47V0815
7.2.25

Vba32 AntiVirus
AdWare.Win64.Yotoon
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
32780

File size:
51.7 KB (52,920 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win32 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{67c662df-ee30-43f3-a32d-6c1a5a35a202}gw.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/19/2014 4:30:00 AM

Valid to:
3/20/2015 3:29:59 AM

Subject:
CN=BooZaka, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=BooZaka, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
798D14F2EA94D165A332BEEBA73F4EE8

File PE Metadata
Compilation timestamp:
1/31/2014 4:15:28 AM

OS version:
6.1

OS bitness:
Win32

Subsystem:
Native (none required)

Linker version:
9.0

CTPH (ssdeep):
768:oIsHpnKHCBSqUPJHKQpkJxpKwT2bcWiJmOtX3g2rp3lnbpgS9:vsHRKHLJqQpkYwTsiTtXxtdgS9

Entry address:
0xC03E

Entry point:
8B, FF, 55, 8B, EC, E8, BD, FF, FF, FF, 5D, E9, 62, 50, FF, FF, CC, CC, 74, C1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, BC, C4, 00, 00, C0, A0, 00, 00, B4, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 12, C5, 00, 00, 00, A0, 00, 00, EC, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, AE, C8, 00, 00, 38, A0, 00, 00, C4, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, A6, C9, 00, 00, 10, A0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, EA, C4, 00, 00, FE, C4, 00, 00, D6, C4...
 
[+]

Entropy:
6.3556

Code size:
37 KB (37,888 bytes)

Driver
Display name:
{67c662df-ee30-43f3-a32d-6c1a5a35a202}Gw

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI


Remove {67c662df-ee30-43f3-a32d-6c1a5a35a202}gw.sys - Powered by Reason Core Security