bbjoin.exe

Keep-My-Search LTD

The application bbjoin.exe by Keep-My-Search has been detected as adware by 20 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered by a time event. While running, it connects to the Internet address NY1WV3659 on port 80 using the HTTP protocol.
Publisher:
Pay By Ads LTD  (signed by Keep-My-Search LTD)

Version:
1.3.0.0

MD5:
bbf7f77baa6d04ecf39488a5b00af6bc

SHA-1:
d0a854169555c938effd3c700eb64dac7db6ad29

SHA-256:
ba44b53c609a85dd3c175c66b9d6ba44b5dabf7b021b53cc2796c13720359d6f

Scanner detections:
20 / 68

Status:
Adware

Analysis date:
4/20/2024 12:03:21 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.74943
670

Avira AntiVirus
ADWARE/Adware.Gen7
3.6.1.96

AVG
Generic
2016.0.3153

Baidu Antivirus
PUA.Win32.Montiera
4.0.3.1541

Bitdefender
Gen:Variant.Strictor.74943
1.0.20.475

Comodo Security
ApplicUnwnt
21595

Emsisoft Anti-Malware
Gen:Variant.Strictor.74943
8.15.04.05.12

ESET NOD32
Win32/Toolbar.Montiera.Q potentially unwanted (variant)
9.11401

Fortinet FortiGate
Riskware/Montiera
4/1/2015

F-Secure
Gen:Variant.Strictor.74943
11.2015-05-04_1

G Data
Win32.Application.Agent.K09MHP
15.4.25

K7 AntiVirus
Trojan
13.202.15430

Malwarebytes
PUP.Optional.Buenosearch.A
v2015.04.01.10

McAfee
Artemis!BBF7F77BAA6D
5600.6809

MicroWorld eScan
Gen:Variant.Strictor.74943
16.0.0.285

Reason Heuristics
PUP.Task.Montiera
15.4.1.10

Sophos
PayByAds
4.98

Trend Micro House Call
TROJ_GEN.R047C0OCB15
7.2.91

Trend Micro
TROJ_GEN.R047C0OCB15
10.465.01

VIPRE Antivirus
Trojan.Win32.Generic
38918

File size:
633.3 KB (648,448 bytes)

Copyright:
All rights reserved.

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\holasearch\holasearch\1.3.22.2\bbjoin.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
9/8/2014 2:00:00 AM

Valid to:
11/12/2015 1:00:00 PM

Subject:
CN=Keep-My-Search LTD, O=Keep-My-Search LTD, L=Tel Aviv, C=IL

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
087407E453FFF7E46DB51873975E63CB

File PE Metadata
Compilation timestamp:
2/25/2015 9:56:11 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:Hro2koeuEgctcjnVAzYP0qu1Cr9e2JarpU0kDscrlDUXU4j:igSoFeZkDsc9UXvj

Entry address:
0x50CFA

Entry point:
E8, A3, AD, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, 38, D2, 48, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, 3C, D2, 48, 00, 5D, C3, 05, 44, FF, FF, FF, 6A, 0E, 59, 3B, C8, 1B, C0, 23, C1, 83, C0, 08, 5D, C3, E8, E9, 38, 00, 00, 85, C0, 75, 06, B8, A0, D3, 48, 00, C3, 83, C0, 08, C3, E8, D6, 38, 00, 00, 85, C0, 75, 06, B8, A4, D3, 48, 00, C3, 83, C0, 0C, C3, 8B, FF, 55, 8B, EC, 56, E8, E2, FF, FF, FF, 8B, 4D, 08...
 
[+]

Code size:
448 KB (458,752 bytes)

Scheduled Task
Task name:
bbjoin_crr_uninst

Trigger:
Time


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to NY1WV3561  (204.145.82.26:80)

TCP (HTTP):
Connects to NY1WV3438  (204.145.82.24:80)

TCP (HTTP):
Connects to ny1wv3280.xglobe.net  (204.145.82.20:80)

TCP (HTTP):
Connects to NY1WV3659  (204.145.82.27:80)

Remove bbjoin.exe - Powered by Reason Core Security