I was infected by a Trojan from combatshell[.]com – here’s what happened (Full Malware Analysis)
Hi everyone,
I want to share a recent experience I had involving a malicious executable I accidentally ran, which turned out to be a highly evasive and dangerous Trojan. The file was called CombatShell.exe and it came from the website http://combatshell[.]com.
After running it, the malware immediately bypassed Windows UAC (User Account Control), gaining administrator privileges silently. From there, it performed several suspicious actions:
The malware hijacked msedge.exe (Microsoft Edge) and used it as a disguise to operate in the background — likely to evade detection by common antivirus programs.
- Checked for virtualization/sandbox environments by scanning for VirtualBox and VMWare files, executables, and drivers.
- Created persistence by dropping a startup file in the Windows startup folder.
- Modified the Windows Registry to hijack .lnk (shortcut) file behavior and redirect them to the malware’s executable.
- Enumerated detailed system information (BIOS, CPU vendor, browser info, IP address via external service).
- Dropped multiple files inside Program Files, which is highly suspicious behavior.
- Used dangerous Windows APIs like WriteProcessMemory, SetWindowsHookEx, and AdjustPrivilegeToken, possibly to inject code, escalate privileges, or even install a keylogger.
Once I realized the extent of the infection through a sandbox analysis (Triage report linked below), I immediately disconnected the machine, wiped the system, and changed all my passwords. There’s still a concern about what information may have been leaked during the infection.
Here’s the full behavioral report from the sandbox I used, for those interested in technical details (includes TTPs, IOCs, memory writes, and more):
hxxp://combatshell[.]com | Triage
@Andy Ful Does using WHHL cant prevent lnk (shortcut) file behavior hijack and redirection to the malware’s executable? and would using "Block use of copied or impersonated system tools" rule prevent bypassing Windows UAC?
Last edited: