{"id":21717,"date":"2024-06-27T11:09:30","date_gmt":"2024-06-27T11:09:30","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=21717"},"modified":"2024-10-18T17:22:22","modified_gmt":"2024-10-18T17:22:22","slug":"pua-win32-presenoker-adware","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/pua-win32-presenoker-adware\/","title":{"rendered":"What is PUA:Win32\/Presenoker?"},"content":{"rendered":"<p><strong>PUA:Win32\/Presenoker is an adware<\/strong> designed to make money by showing intrusive advertisements and collecting data. This malware can take control of your web browser and send you to advertising pages. The majority of them will be questionable, without even a slight tint of relevance.<\/p>\n<p>It is often disguised as legitimate cracked software, driver finder, or tweaker. This malware can also steal some information.<\/p>\n<h2>PUA:Win32\/Presenoker Overview<\/h2>\n<p>PUA:Win32\/Presenoker <a href=\"https:\/\/gridinsoft.com\/adware\">is adware<\/a> designed to generate revenue through intrusive advertisements. In addition to malvertising, it can steal users&#8217; data, including search history, cookies, and other sensitive information. Although <strong>it collects basic system information<\/strong>, it is only about fingerprinting the system; it does not touch passwords or session tokens. Almost all instances of this malware are connected to websites that redirect users to advertising pages. While some pages it advertises are legitimate, others are questionable, significantly degrading the user experience.<\/p>\n<figure id=\"attachment_21734\" aria-describedby=\"caption-attachment-21734\" style=\"width: 464px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/Presenoker-detection.webp\" alt=\"PUA:Win32\/Presenoker detection window screenshot\" width=\"464\" height=\"301\" class=\"size-full wp-image-21734\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/Presenoker-detection.webp 464w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/Presenoker-detection-300x195.webp 300w\" sizes=\"auto, (max-width: 464px) 100vw, 464px\" \/><figcaption id=\"caption-attachment-21734\" class=\"wp-caption-text\">PUA:Win32\/Presenoker detection window<\/figcaption><\/figure>\n<p>PUA:Win32\/Presenoker often spreads under the guise of <a href=\"https:\/\/gridinsoft.com\/crack\">cracked legitimate software<\/a>, tricking users and infiltrating their devices without their consent. The malware also masquerades as a laptop driver finder or tweaker. However, almost anything downloaded that is not from an official website can lead to Presenoker infection.<\/p>\n<h2>Presenoker Technical Analysis<\/h2>\n<p>Let&#8217;s break down its behavior based on the PUA:Win32\/Presenoker <a href=\"https:\/\/gridinsoft.com\/online-virus-scanner\/id\/8187bb536c97c471ba17371542b1457c7392099735cd2afe817f9c04d5e4b196\">sample analysis<\/a>. As I said above, malware infiltrates the system under the guise of legitimate software. In our case, it is a free but Windows kernel research tool.<\/p>\n<p>Once on the system, malware seeks persistence. To do so, it performs standard actions\u2014it <strong>creates driver files, adds appropriate registry entries, and obtains the necessary permissions<\/strong>. Among the latter is the ability to modify the kernel to execute programs at system startup.<\/p>\n<p><code style=\"font-size: 14px\">HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SafeBoot\\Minimal\\bajejyicthbeby.sys<br \/>\nHKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SafeBoot\\Minimal\\bhrzxcfdwsfytp.sys<br \/>\nHKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Control\\SafeBoot\\Minimal\\boalxrinybzftbduk.sys<\/code><\/p>\n<p>The malware created multiple registry entries for each file to ensure its drivers and services were loaded in &#8220;Minimal Safe Mode&#8221;, a diagnostic mode of Windows with only essential functions.<\/p>\n<h3>C2 Communication<\/h3>\n<p>Presenoker takes multiple HTTP requests made to various URLs, including ww1.epoolsoft[.]com and www.epoolsoft[.]com, suggesting communication <a href=\"https:\/\/gridinsoft.com\/command-and-control\">with a command-and-control (C2) server<\/a>. TCP connections are established to several IP addresses on ports 80 and 443, indicating potential communication with external servers.<\/p>\n<p><code style=\"font-size: 14px\">TCP 63.143.32.86:80<br \/>\nTCP 64.190.63.136:80<br \/>\nUDP a83f:8110:0:0:6076:c7a:e801:0:53<\/code><\/p>\n<p>The malware probably receives adverts through some channels (opening some of these addresses redirects to the advertised websites).<\/p>\n<h3>Presenoker Advertising<\/h3>\n<p>As I said before, the primary purpose of this kind of application is advertising. Usually, these ads often promote online scams, unreliable or hazardous software, and malware. When clicked on, some ads can execute scripts to install or download software without the user&#8217;s consent.<\/p>\n<div class=\"su-image-carousel  su-image-carousel-has-spacing su-image-carousel-has-outline su-image-carousel-adaptive su-image-carousel-slides-style-default su-image-carousel-controls-style-dark su-image-carousel-align-center\" style=\"\" data-flickity-options='{\"groupCells\":true,\"cellSelector\":\".su-image-carousel-item\",\"adaptiveHeight\":true,\"cellAlign\":\"left\",\"prevNextButtons\":true,\"pageDots\":true,\"autoPlay\":5000,\"imagesLoaded\":true,\"contain\":false,\"selectedAttraction\":0.007,\"friction\":0.25}' id=\"su_image_carousel_696cff7b6da50\"><div class=\"su-image-carousel-item\"><div class=\"su-image-carousel-item-content\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"1074\" height=\"841\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/ad1.webp\" class=\"\" alt=\"Promoted web site screenshot\" title=\"\"><span>A promoted web site that epoolsoft.com redirects to.<\/span><\/div><\/div><div class=\"su-image-carousel-item\"><div class=\"su-image-carousel-item-content\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"1074\" height=\"841\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/ad2.webp\" class=\"\" alt=\"Promoted web site screenshot\" title=\"\"><span>A promoted web site that epoolsoft.com redirects to.<\/span><\/div><\/div><div class=\"su-image-carousel-item\"><div class=\"su-image-carousel-item-content\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"1074\" height=\"841\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/ad3.webp\" class=\"\" alt=\"Promoted web site screenshot\" title=\"\"><span>A promoted web site that epoolsoft.com redirects to.<\/span><\/div><\/div><\/div><script id=\"su_image_carousel_696cff7b6da50_script\">if(window.SUImageCarousel){setTimeout(function() {window.SUImageCarousel.initGallery(document.getElementById(\"su_image_carousel_696cff7b6da50\"))}, 0);}var su_image_carousel_696cff7b6da50_script=document.getElementById(\"su_image_carousel_696cff7b6da50_script\");if(su_image_carousel_696cff7b6da50_script){su_image_carousel_696cff7b6da50_script.parentNode.removeChild(su_image_carousel_696cff7b6da50_script);}<\/script>\n<p>In rare cases, users will see what looks like a legitimate internet search website like Yahoo or Bing, but with changed results. The URLs below are the intermediary sites that appear in the URL bar during this redirection. It looks like they gather the information about the search queries and God knows what else.<\/p>\n<p><code style=\"font-size: 14px\">hxxp:\/\/www.epoolsoft[.]com\/PCHunter_StandardV1.56=DE8D8650A2322F6FBD61DC24EA6CE9703EDC1C1ABBA4523E236D3DE26CFD2B49C08503DEEA5AEDF515739967BDA959FD<br \/>\nhxxp:\/\/ww1.epoolsoft[.]com\/?sub1=39aa0efd-0311-11ef-af09-729c7805264a<br \/>\nhxxp:\/\/www.epoolsoft[.]com\/pchunter\/pchunter_free<\/code><\/p>\n<p>This website contains links that, when clicked on, will redirect you using <a href=\"https:\/\/gridinsoft.com\/online-virus-scanner\/url\/adsensecustomsearchads-com\">adsensecustomsearchads.com<\/a><\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/redirect.webp\" alt=\"Redirect address screenshot\" width=\"703\" height=\"124\" class=\"aligncenter size-full wp-image-21745\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/redirect.webp 703w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/redirect-300x53.webp 300w\" sizes=\"auto, (max-width: 703px) 100vw, 703px\" \/><\/p>\n<h3>Defense Evasion<\/h3>\n<p>Malware may use <strong><a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/api\/debugapi\/nf-debugapi-isdebuggerpresent\" target=\"_blank\" rel=\"noopener nofollow\">IsDebuggerPresent<\/a> and SetWindowsHookExW<\/strong> to evade detection and employ hooking techniques. The PE file has a section (not .text) that is highly probable to contain compressed code using a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zlib\" rel=\"nofollow noopener\" target=\"_blank\">zlib compression ratio<\/a> of less than 0.011. It also checks for debuggers, including window names and unique Hardware\/Firmware, and can detect virtual machines. Moreover, it may use evasive loops to hinder dynamic analysis and check whether the current process is under debugging.<\/p>\n<p><code style=\"font-size: 14px\">HKEY_LOCAL_MACHINE\\HARDWARE\\DESCRIPTION\\System\\SystemBiosVersion<br \/>\nHKEY_LOCAL_MACHINE\\HARDWARE\\DESCRIPTION\\System\\VideoBiosVersion<\/code><\/p>\n<p>As the name says, these keys contain BIOS information. That is enough data to understand whether the system is a virtual machine or some other modified environment.<\/p>\n<h2>How To Remove PUA:Win32\/Presenoker?<\/h2>\n<p>To remove PUA:Win32\/Presenoker you need to use a powerful antimalware solution. GridinSoft Anti-Malware will be an excellent choice to clean your system from unwanted software. In addition to cleaning, this solution will prevent future infections on your device.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp\" alt=\"GridinSoft Anti-Malware main screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22665\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-main-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Download and install Anti-Malware by clicking the button below. After the installation, run a Full scan: this will check all the volumes present in the system, including hidden folders and system files. Scanning will take around 15 minutes.<\/p>\n<div style=\"text-align:center\"><a href=\"\/download\/antimalware\" class=\"btn border-black\" rel=\"nofollow\">Download Anti-Malware<\/a><\/div>\n<p>After the scan, you will see the list of detected malicious and unwanted elements. It is possible to adjust the actions that the antimalware program does to each element: click \"Advanced mode\" and see the options in the drop-down menus. You can also see extended information about each detection - malware type, effects and potential source of infection.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp\" alt=\"Scan results screen\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22666\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-result-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n<p>Click \"Clean Now\" to start the removal process. Important: removal process may take several minutes when there are a lot of detections. Do not interrupt this process, and you will get your system as clean as new.<\/p>\n<img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp\" alt=\"Removal finished\" width=\"886\" height=\"689\" class=\"aligncenter size-full wp-image-22667\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean.webp 886w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-300x233.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/06\/antimalware-clean-768x597.webp 768w\" sizes=\"auto, (max-width: 886px) 100vw, 886px\" \/>\n","protected":false},"excerpt":{"rendered":"<p>PUA:Win32\/Presenoker is an adware designed to make money by showing intrusive advertisements and collecting data. This malware can take control of your web browser and send you to advertising pages. The majority of them will be questionable, without even a slight tint of relevance. It is often disguised as legitimate cracked software, driver finder, or [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":21743,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[17],"tags":[32,474,223],"class_list":{"0":"post-21717","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-labs","8":"tag-adware","9":"tag-unwanted-programs","10":"tag-windows-defender"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/04\/GS_Blog_banner_What-is-PUA_Win32_Presenoker.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/21717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=21717"}],"version-history":[{"count":26,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/21717\/revisions"}],"predecessor-version":[{"id":27726,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/21717\/revisions\/27726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/21743"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=21717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=21717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=21717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}