utilgreenerweb.exe

SurfEnhance

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application utilgreenerweb.exe by SurfEnhance has been detected as adware by 5 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Update Greener Web”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
SurfEnhance  (signed and verified)

Version:
1.0.5439.42068

MD5:
21f41be0f583b09f48511ec48c71ac72

SHA-1:
36f36d073248405a66f590b5846e047263414b14

SHA-256:
548f7277c481fae31ae60be7fb96cec87f772bc137da9d2cc6b88b60f2ef38fe

Scanner detections:
5 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/23/2024 10:24:12 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3282

Baidu Antivirus
Adware.MSIL.BrowseFox
4.0.3.141123

ESET NOD32
MSIL/BrowseFox.G potentially unwanted application
7.0.302.0

K7 AntiVirus
Adware
13.185.14098

Reason Heuristics
Adware.Yontoo.Service.O
14.12.1.0

File size:
413.3 KB (423,200 bytes)

Product version:
1.0.5439.42068

Original file name:
GreenerWeb2014112307.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\greener web\bin\utilgreenerweb.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
9/27/2013 3:00:00 AM

Valid to:
9/28/2015 2:59:59 AM

Subject:
CN=SurfEnhance, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=SurfEnhance, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
052C87532FBD523C55FB8703A352F6AB

File PE Metadata
Compilation timestamp:
11/23/2014 10:22:16 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:b2bIVDinmwYdcF8vw6YuyVNmreGKuVfD3XbsqCgR7bZQ6f+RL952rGp5HEI:KbI79rvwzm1KwL3rTxZQboa7

Entry address:
0x6713E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.8946

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
404.5 KB (414,208 bytes)

Service
Display name:
Update Greener Web

Type:
Win32OwnProcess


Remove utilgreenerweb.exe - Powered by Reason Core Security