maintainer.exe

BrowseStudio

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application maintainer.exe by BrowseStudio has been detected as adware by 30 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “MaintainerSvc4.52.864054”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
BrowseStudio  (signed and verified)

Version:
1.0.5458.40638

MD5:
97b0935ac5b5917c6312eb30c42f2795

SHA-1:
900844500ede8372f5783db212e4779bc1dba73e

SHA-256:
97d93594a157a74ec46a43a297881cdafd82388373f8a9d3e62c05470c6e3766

Scanner detections:
30 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/19/2024 10:07:34 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.CS
784

AhnLab V3 Security
Adware/Win32.SwiftBrowse
2014.12.12

Avira AntiVirus
Adware/BrowseFox.aol
7.11.194.194

avast!
Win32:Adware-BYZ [PUP]
2014.9-141212

AVG
Generic
2015.0.3262

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.141212

Bitdefender
Adware.SwiftBrowse.CS
1.0.20.1730

Clam AntiVirus
Win.Adware.Agent-22685
0.98/21511

Comodo Security
Application.Win32.BrowseFox.B
20343

Dr.Web
Trojan.BPlug.437
9.0.1.0346

Emsisoft Anti-Malware
Adware.SwiftBrowse.CS
8.14.12.12.05

ESET NOD32
Win32/BrowseFox
8.10865

F-Prot
W32/A-de841313
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.CS
11.2014-12-12_6

G Data
Adware.SwiftBrowse.CS
14.12.24

IKARUS anti.virus
AdWare.SwiftBrowse
t3scan.1.8.5.0

K7 AntiVirus
Trojan
13.186.14309

Kaspersky
not-a-virus:AdWare.Win32.Yotoon
14.0.0.2806

Malwarebytes
PUP.Optional.SwiftBrowse
v2014.12.12.05

McAfee
Artemis!97B0935AC5B5
5600.6918

MicroWorld eScan
Adware.SwiftBrowse.CS
15.0.0.1038

NANO AntiVirus
Riskware.Win32.Kranet.dgiwfc
0.28.6.63850

nProtect
Trojan-Clicker/W32.Yotoon.123632
14.12.12.01

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Quick Heal
AdWare.Yotoon.A5
12.14.14.00

Reason Heuristics
PUP.Service.BrowseStudio.K
14.12.12.17

SUPERAntiSpyware
Adware.SwiftBrowse
10182

Vba32 AntiVirus
AdWare.Yotoon
3.12.26.3

VIPRE Antivirus
Yontoo
35650

Zillya! Antivirus
Adware.Kranet.Win32.476
2.0.0.2004

File size:
120.7 KB (123,632 bytes)

Product version:
1.0.5458.40638

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\ddc24aa9-6c5d-44d0-8c40-9bed83bb2ab7\maintainer.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
9/1/2014 5:00:00 PM

Valid to:
9/2/2015 4:59:59 PM

Subject:
CN=BrowseStudio, O=BrowseStudio, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
11AE532A33120159E1078A0D3EDE88C9

File PE Metadata
Compilation timestamp:
12/11/2014 10:34:46 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
1536:13eRgxyOpGX5sfnC6P2dV59IikYYf9J892bbY+mbbcQ/Wm1sWjcdgPQI0ypxCO8F:JK35/9oxfTk+Qvn6gPQI0ypxCOP3bZvA

Entry address:
0x8A72

Entry point:
E8, 95, 57, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 68, B2, 41, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 79, 45, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 6A, 4C, 8D, 85, E4, FC, FF, FF, 6A, 00, 50, E8, 7A, F3, FF, FF, 8D, 85, E0, FC, FF, FF, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 83, C4, 0C, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Entropy:
6.1811

Code size:
68.5 KB (70,144 bytes)

Service
Display name:
MaintainerSvc4.52.864054

Type:
Win32OwnProcess

Depends on:
RPCSS


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):

TCP (HTTP):
Connects to a184-84-183-112.deploy.static.akamaitechnologies.com  (184.84.183.112:80)

TCP (HTTP):
Connects to a184-84-183-106.deploy.static.akamaitechnologies.com  (184.84.183.106:80)

Remove maintainer.exe - Powered by Reason Core Security