ibehvwlgpfgce.exe

CinemaPlus-3.2cV01.05

Digit Network (Extreme White Limited)

The application ibehvwlgpfgce.exe, “CinemaPlus-3.2cV01.05 Installer” by Digit Network (Extreme White Limited) has been detected as adware by 25 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address tlb.hwcdn.net on port 80 using the HTTP protocol.
Publisher:
Cinema PlusV01.05  (signed by Digit Network (Extreme White Limited))

Product:
CinemaPlus-3.2cV01.05

Description:
CinemaPlus-3.2cV01.05 Installer

Version:
1.36.01.22

MD5:
1924de8db303d5de10578f54ec09033f

SHA-1:
8a9ad95acbfec9f1f7d57f03a142fff542bf70b7

SHA-256:
54a41315faec928aab979dfcf25fe443e74687ad0c14f512342ae8f08fe77ed8

Scanner detections:
25 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/26/2024 12:39:30 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.JS.Crossrider.B
546

Agnitum Outpost
Riskware.VMDetector
7.1.1

Avira AntiVirus
ADWARE/CrossRider.Gen
8.3.1.6

avast!
NSIS:Adware-PE [PUP]
2014.9-150807

AVG
Crossrider
2016.0.3024

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Crossrider.46916
9.0.1.0219

ESET NOD32
Win32/Toolbar.CrossRider.CM potentially unwanted (variant)
9.11658

Fortinet FortiGate
PossibleThreat
8/7/2015

G Data
Script.Application.Plush
15.8.25

K7 AntiVirus
Adware
13.204.15977

Kaspersky
not-a-virus:WebToolbar.JS.CroRi
14.0.0.1616

Malwarebytes
v2015.08.07.08

McAfee
Artemis!1924DE8DB303
5600.6680

MicroWorld eScan
Adware.JS.Crossrider.B
16.0.0.657

NANO AntiVirus
Riskware.Win32.CrossRider.drfioh
0.30.24.1636

Panda Antivirus
Generic Suspicious
15.08.07.08

Qihoo 360 Security
HEUR/QVM20.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.ExtremeWhite.DigitNetworkExtremeWhiteLimited.Installer (M)
15.8.7.20

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.15805

Trend Micro House Call
TROJ_GE.97D14315
7.2.219

Trend Micro
TROJ_GE.97D14315
10.465.07

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
40412

Zillya! Antivirus
Trojan.BlackGen.Win32.11
2.0.0.2185

File size:
13.3 MB (13,930,456 bytes)

Copyright:
Copyright Cinema PlusV01.05

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\ibehvwlgpfgce.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
4/15/2015 2:00:00 AM

Valid to:
4/15/2016 1:59:59 AM

Subject:
CN=Digit Network (Extreme White Limited), O=Digit Network (Extreme White Limited), STREET=Tassou Papadopulu 6 (flat/office 22), L=Nicosia, S=Agios Dometios, PostalCode=2373, C=CY

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00F39F5E5096779B72822CF8381166A432

File PE Metadata
Compilation timestamp:
12/4/2012 2:55:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
393216:isRazA7/C3qcySos5tN4cV2lgaciyHrBwk:iscs/Cf5TNMlAiGrBwk

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Code size:
34.5 KB (35,328 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.14.84:80)

TCP (HTTP):
Connects to ec2-23-23-208-103.compute-1.amazonaws.com  (23.23.208.103:80)

Remove ibehvwlgpfgce.exe - Powered by Reason Core Security