kns405f.tmp

The file kns405f.tmp has been detected as a potentially unwanted program by 3 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Keypad Cancel”. The file has been seen being downloaded from livestatscounter.com.
MD5:
42a98983b26515a63d4f19c982133122

SHA-1:
9fc2c1515e6b56bf9915d3d64318f42a31d623f5

SHA-256:
03d182528b1ca43753eea37165add72b56bd16a6176f33ac87047eca185abcca

Scanner detections:
3 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 8:15:24 PM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Adware.ConvertAd.AKA application
6.3.12010.0

F-Secure
Variant.Graftor.339970
5.15.154

Reason Heuristics
PUP.ConvertAd.ET (M)
17.2.15.7

File size:
354 KB (362,496 bytes)

Common path:
C:\Program Files\3cf3a69d-7485-49ac-a437-bbfa0f8e54bf1486888653\kns405f.tmp

File PE Metadata
Compilation timestamp:
2/15/2017 2:16:15 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0xD642

Entry point:
E8, C4, 06, 00, 00, E9, 8E, FE, FF, FF, 3B, 0D, 70, 50, 45, 00, F2, 75, 02, F2, C3, F2, E9, 47, 08, 00, 00, FF, 25, 4C, F2, 43, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, F2, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 70, 50, 45, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, F2, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B...
 
[+]

Entropy:
6.6143

Code size:
246.5 KB (252,416 bytes)

Service
Display name:
Keypad Cancel

Service name:
xoleroxu

Description:
Lock ADSL

Type:
Win32OwnProcess


The file kns405f.tmp has been seen being distributed by the following URL.

https://livestatscounter.com/.../vsrv.php?sid=b0fb43a0-309d-4a84-a903-207c54f9e91d

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-52-6-149-47.compute-1.amazonaws.com  (52.6.149.47:80)

TCP (HTTP):
Connects to ec2-54-83-176-117.compute-1.amazonaws.com  (54.83.176.117:80)

TCP (HTTP):
Connects to ec2-52-207-68-222.compute-1.amazonaws.com  (52.207.68.222:80)

TCP (HTTP):
Connects to ec2-52-45-168-108.compute-1.amazonaws.com  (52.45.168.108:80)

TCP (HTTP SSL):
Connects to dl21.clickmein.com  (216.227.128.186:443)

TCP (HTTP SSL):
Connects to sgsg01.proinity.net  (119.81.66.215:443)

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.49.129:80)

TCP (HTTP):
Connects to ns3055507.ip-193-70-8.eu  (193.70.8.80:80)

TCP (HTTP):
Connects to IP-84-131.napinfo.net  (110.35.84.131:80)

TCP (HTTP):
Connects to 94.31.29.64.IPYX-077437-ZYO.above.net  (94.31.29.64:80)

TCP (HTTP):
Connects to 10gbps.io  (37.235.108.100:80)

TCP (HTTP):
Connects to dl19.clickmein.com  (50.7.184.162:80)

TCP (HTTP):
Connects to ec2-34-196-207-136.compute-1.amazonaws.com  (34.196.207.136:80)

Remove kns405f.tmp - Powered by Reason Core Security