knsf11c.tmp

The file knsf11c.tmp has been detected as a potentially unwanted program by 11 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Drop Shadow Software”. While running, it connects to the Internet address server-54-230-53-18.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
MD5:
ac5125b53eca71713161fee279cd4a79

SHA-1:
93a8ad8f78c9e91f117a11c7a820f2948b7166ae

Scanner detections:
11 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 1:57:25 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Kazy.642419
571

Arcabit
Trojan.Application.Kazy.D9CD73
1.0.0.425

Baidu Antivirus
Adware.Win32.ConvertAd
4.0.3.15713

Bitdefender
Gen:Variant.Application.Kazy.642419
1.0.20.970

ESET NOD32
Win32/Adware.ConvertAd.UL (variant)
9.11929

F-Secure
Gen:Variant.Kazy.642419
11.2015-13-07_2

G Data
Gen:Variant.Application.Kazy.642419
15.7.25

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.1740

MicroWorld eScan
Gen:Variant.Application.Kazy.642419
16.0.0.582

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
15.7.13.21

File size:
288.5 KB (295,424 bytes)

Common path:
C:\Documents and Settings\{user}\Application data\4c4c4544-1436638704-4a10-8056-b1c04f4e3731\knsf11c.tmp

File PE Metadata
Compilation timestamp:
7/12/2015 8:01:29 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:rDILWOwJ+yRSGe1OiepNMQbxya0+0VD/KOREm/Q:rcLWlzRSGe13QbxtkVD/KORE

Entry address:
0x233D1

Entry point:
E8, 16, 75, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 55, 08, 56, 57, 85, D2, 74, 07, 8B, 7D, 0C, 85, FF, 75, 13, E8, 23, 23, 00, 00, 6A, 16, 5E, 89, 30, E8, C7, 22, 00, 00, 8B, C6, EB, 33, 8B, 45, 10, 85, C0, 75, 04, 88, 02, EB, E2, 8B, F2, 2B, F0, 8A, 08, 88, 0C, 06, 40, 84, C9, 74, 03, 4F, 75, F3, 85, FF, 75, 11, C6, 02, 00, E8, ED, 22, 00, 00, 6A, 22, 59, 89, 08, 8B, F1, EB, C6, 33, C0, 5F, 5E, 5D, C3, 8B, FF, 55, 8B, EC, 53, 8B, 5D, 08, 83, FB, E0, 77, 6F, 56, 57, 83, 3D, 1C, 51, 44, 00, 00...
 
[+]

Entropy:
6.2981

Code size:
201.5 KB (206,336 bytes)

Service
Display name:
Drop Shadow Software

Service name:
bogumocu

Description:
Firewall Highlighted

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-53-18.jfk6.r.cloudfront.net  (54.230.53.18:80)

TCP (HTTP):
Connects to ec2-107-21-122-166.compute-1.amazonaws.com  (107.21.122.166:80)

Remove knsf11c.tmp - Powered by Reason Core Security