Home / malware Adware:Win32/Brya
First posted on 28 April 2015.
Source: MicrosoftAliases :
There are no other names known for Adware:Win32/Brya.
Explanation :
Threat behavior
Installation
This adware is dropped by an installer with the SHA1: 0794996d44dbf7620837cb0088dd4ac575841cfe.
It opens up a browser page to hxxp://www.arabyonline.com//PPUP.php?src=CHOMP. Then, it directs you another advertisement site, hxxp://trendtradingpartner.com/ /suspendedpage.cgi?engsec=15.
Since it does not have a user interface, you cannot easily uninstall it. After the installation, the installer deletes itself.
This adware is installed in the following path, and then runs Chomp.exe in the background:
- %USERPROFILE% \Application Data\Popper\diag\Chomp.exe
This threat can also create files on your PC, including:
- %USERPROFILE% \Application Data\Popper\ChompUpd.exe
It adds the following registry entry so that it runs each time you start your PC:
In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: Eei
With data: C:\Users\rdp\AppData\Local\diag\Chomp.exe
This adware also adds the following registry entries as part of its installation routine:
In subkey: HKEY_CURRENT_USER\Software\Popper\Data
Sets value: "CurrentVersion"
With data: "1"
In subkey: HKEY_CURRENT_USER\Software\Popper\Data
Sets value: "UpdateURL"
With data: "https://s3.amazonaws.com//ver.txt"
In subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Adsfree
Sets value: "Id"
With data: "{9E85F0AC-3100-4D38-91CC-C6E3489244AF}"
In subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Popper
Sets value: "Id"
With data: "{C3D72B52-F6AA-4E18-8C5C-B76C012571E3}"
The URL hxxps://s3.amazonaws.com//ver.txt contains the following code:
silent
https://s3.amazonaws.com//Chomper.exe
Win7
New version is available
SHA-512
Chomper.exe seems like an updated version of the adware, but is no longer accessible.
Payload
Adds scheduled tasks in your PC
This adware adds these two scheduled tasks which runs upon user logon:
Adsfree - %USERPROFILE%\Application Data\Popper\ChompUpd.exe
Popper - %USERPROFILE%\Application Data\Popper\diag\Chomp.exe
New variants come in the following names:
9A5A8340-6B15 - %USERPROFILE%\Application Data\Roaming\ARHome\Updater.exe
Java Update - C:\Program Files\Java\Java.exe
Office - C:\Program Files\Office\Office.exe
.
Symptoms
The following can indicate that you have this threat on your PC:
- You see these files in the following directories:
- %USERPROFILE%\Application Data\Popper\diag\Chomp.exe
- %USERPROFILE%\Application Data\Popper\ChompUpd.exe
- You see registry modifications such as:
- In subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: Eei
With data: C:\Users\rdp\AppData\Local\diag\Chomp.exe- In subkey: HKEY_CURRENT_USER\Software\Popper\Data
Sets value: "CurrentVersion"
With data: "1"- In subkey: HKEY_CURRENT_USER\Software\Popper\Data
Sets value: "UpdateURL"
With data: https://s3.amazonaws.com//ver.txt - In subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Adsfree
Sets value: "Id"
With data: "{9E85F0AC-3100-4D38-91CC-C6E3489244AF}"- In subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Popper
Sets value: "Id"
With data: "{C3D72B52-F6AA-4E18-8C5C-B76C012571E3}"
Last update 28 April 2015