kns9af7.tmp

The file kns9af7.tmp has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “OCR ADSL”. The file has been seen being downloaded from livestatscounter.com and multiple other hosts.
MD5:
6047ab55c26f9b06a1627720ac054a6a

SHA-1:
eb9e0ecb39bb1b7db1f209dc84a178e58d0507f5

SHA-256:
1f66b172eec417e31f25c0e07d5731949bd1c1a345322163f1287717d5265b2d

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 10:12:43 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.ConvertAd
17.2.2.5

File size:
379.5 KB (388,608 bytes)

Common path:
C:\Program Files\84d283d0-4b6c-487d-bcae-4d80061d47691486011750\kns9af7.tmp

File PE Metadata
Compilation timestamp:
2/2/2017 1:24:23 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

Entry address:
0x14D3F

Entry point:
E8, F7, 0B, 00, 00, E9, 8E, FE, FF, FF, 3B, 0D, 74, B0, 45, 00, F2, 75, 02, F2, C3, F2, E9, 69, 0D, 00, 00, 55, 8B, EC, 5D, E9, A4, F7, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8...
 
[+]

Entropy:
6.5536

Code size:
275 KB (281,600 bytes)

Service
Display name:
OCR ADSL

Service name:
hikecozi

Description:
Removable Media Desktop Printer

Type:
Win32OwnProcess


The file kns9af7.tmp has been seen being distributed by the following 2 URLs.

https://livestatscounter.com/.../vsrv.php?sid=93e831a8-ea20-4167-8869-f54a97d9ccb6

https://livestatscounter.com/.../vsrv.php?sid=0d78fec1-5097-499f-82b5-dd87a65ea6dc

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-83-176-117.compute-1.amazonaws.com  (54.83.176.117:80)

TCP (HTTP):
Connects to ec2-52-6-149-47.compute-1.amazonaws.com  (52.6.149.47:80)

TCP (HTTP):
Connects to ec2-52-45-168-108.compute-1.amazonaws.com  (52.45.168.108:80)

TCP (HTTP):
Connects to ec2-52-207-68-222.compute-1.amazonaws.com  (52.207.68.222:80)

TCP (HTTP):
Connects to dl21.clickmein.com  (216.227.128.186:80)

TCP (HTTP SSL):
Connects to sgsg04.proinity.net  (103.254.155.219:443)

TCP (HTTP):
Connects to sgsg02.proinity.net  (119.81.66.229:80)

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.97.234:80)

TCP (HTTP):
Connects to ns3055507.ip-193-70-8.eu  (193.70.8.80:80)

TCP (HTTP):
Connects to 94.31.29.64.IPYX-077437-ZYO.above.net  (94.31.29.64:80)

TCP (HTTP):
Connects to 125.235.4.59.adsl.viettel.vn  (125.235.4.59:80)

TCP (HTTP):
Connects to 10gbps.io  (37.235.108.100:80)

TCP (HTTP):

Remove kns9af7.tmp - Powered by Reason Core Security