{cc30460f-753f-44d9-b58c-13dae1321968}w.sys

Jump Flip

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file {cc30460f-753f-44d9-b58c-13dae1321968}w.sys by Jump Flip has been detected as adware by 6 anti-malware scanners. It runs as a Windows 64-bit kernel mode device driver named “{cc30460f-753f-44d9-b58c-13dae1321968}w”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
StdLib  (signed by Jump Flip)

Product:
StdLib

Version:
1.4.3.1 built by: WinDDK

MD5:
3232c9ed83e2198c18e73208acf681a4

SHA-1:
29fbb4413e1b73a0c7c5983bca026b2158e694e2

SHA-256:
64ff24b558028c2cc21b0959391478b1f3da1bcc3d7b71cbfef50faa67866fdd

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/23/2024 12:32:02 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Yotoon
7.1.1

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.1483

Dr.Web
Trojan.BPlug.123
9.0.1.05190

Reason Heuristics
PUP.JumpFlip.k
14.8.8.0

Vba32 AntiVirus
AdWare.Win64.Yotoon
3.12.26.3

VIPRE Antivirus
Threat.4150696
31208

File size:
51.7 KB (52,928 bytes)

Product version:
1.4.3.1

Copyright:
Copyright © 2013 StdLib

Original file name:
StdLib.sys

File type:
Driver (Win64 SYS)

Language:
English (United States)

Common path:
C:\Windows\System32\drivers\{cc30460f-753f-44d9-b58c-13dae1321968}w.sys

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/22/2013 1:00:00 AM

Valid to:
8/23/2015 12:59:59 AM

Subject:
CN=Jump Flip, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jump Flip, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
144CF0B61216826C7F439B5C91A6ABD6

File PE Metadata
OS bitness:
Win64

CTPH (ssdeep):
768:lIsHpnKHCBSqUPJHKQpkJxpKwT2bcWiJmOtX3g2rp3lnzHmI:6sHRKHLJqQpkYwTsiTtXxtzmI

Entry point:
8B, FF, 55, 8B, EC, E8, BD, FF, FF, FF, 5D, E9, 62, 50, FF, FF, CC, CC, 74, C1, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, BC, C4, 00, 00, C0, A0, 00, 00, B4, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 12, C5, 00, 00, 00, A0, 00, 00, EC, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, AE, C8, 00, 00, 38, A0, 00, 00, C4, C0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, A6, C9, 00, 00, 10, A0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, EA, C4, 00, 00, FE, C4, 00, 00, D6, C4...
 
[+]

Driver
Display name:
{cc30460f-753f-44d9-b58c-13dae1321968}w

Type:
Kernel device driver (KernelDriver)

Group:
PNP_TDI


Remove {cc30460f-753f-44d9-b58c-13dae1321968}w.sys - Powered by Reason Core Security