Overview
overview
6Static
static
6KingRoot v...pi.dll
windows7-x64
3KingRoot v...pi.dll
windows10-2004-x64
3KingRoot v...pi.dll
windows7-x64
1KingRoot v...pi.dll
windows10-2004-x64
3KingRoot v...ot.exe
windows7-x64
3KingRoot v...ot.exe
windows10-2004-x64
3KingRoot v...db.exe
windows7-x64
1KingRoot v...db.exe
windows10-2004-x64
1block
debian-9-armhf
KingRoot v...usybox
debian-9-armhf
1KingRoot v...il.apk
KingRoot v...il.apk
android-10-x64
KingRoot v...il.apk
android-11-x64
KingRoot v...-abuse
debian-9-armhf
flood
debian-9-armhf
KingRoot v...oy.apk
KingRoot v...oy.apk
android-10-x64
KingRoot v...oy.apk
android-11-x64
KingRoot v...bsu.so
debian-9-armhf
KingRoot v...bxy.so
debian-9-armhf
1motofail
debian-9-armhf
rageagainstthecage
debian-9-armhf
1KingRoot v...5/root
debian-9-armhf
KingRoot v...oot.sh
windows7-x64
3KingRoot v...oot.sh
windows10-2004-x64
3KingRoot v...ottool
debian-9-armhf
KingRoot v...805/su
debian-9-armhf
KingRoot v...er.apk
thinkpwn
debian-9-armhf
xyz
debian-9-armhf
zerg
debian-9-armhf
zergRush.bak
debian-9-armhf
Analysis
-
max time kernel
118s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
KingRoot v1.3 2012.12.21.1805/AdbWinApi.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
KingRoot v1.3 2012.12.21.1805/AdbWinApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
KingRoot v1.3 2012.12.21.1805/AdbWinUsbApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
KingRoot v1.3 2012.12.21.1805/AdbWinUsbApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
KingRoot v1.3 2012.12.21.1805/KingRoot.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
KingRoot v1.3 2012.12.21.1805/KingRoot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
KingRoot v1.3 2012.12.21.1805/adb.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
KingRoot v1.3 2012.12.21.1805/adb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
block
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral10
Sample
KingRoot v1.3 2012.12.21.1805/busybox
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral11
Sample
KingRoot v1.3 2012.12.21.1805/evil.apk
Behavioral task
behavioral12
Sample
KingRoot v1.3 2012.12.21.1805/evil.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral13
Sample
KingRoot v1.3 2012.12.21.1805/evil.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral14
Sample
KingRoot v1.3 2012.12.21.1805/exynos-abuse
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral15
Sample
flood
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral16
Sample
KingRoot v1.3 2012.12.21.1805/libboy.apk
Behavioral task
behavioral17
Sample
KingRoot v1.3 2012.12.21.1805/libboy.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral18
Sample
KingRoot v1.3 2012.12.21.1805/libboy.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral19
Sample
KingRoot v1.3 2012.12.21.1805/libsu.so
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral20
Sample
KingRoot v1.3 2012.12.21.1805/libxy.so
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral21
Sample
motofail
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral22
Sample
rageagainstthecage
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral23
Sample
KingRoot v1.3 2012.12.21.1805/root
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral24
Sample
KingRoot v1.3 2012.12.21.1805/root.sh
Resource
win7-20231215-en
Behavioral task
behavioral25
Sample
KingRoot v1.3 2012.12.21.1805/root.sh
Resource
win10v2004-20231215-en
Behavioral task
behavioral26
Sample
KingRoot v1.3 2012.12.21.1805/roottool
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral27
Sample
KingRoot v1.3 2012.12.21.1805/su
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral28
Sample
KingRoot v1.3 2012.12.21.1805/superuser.apk
Behavioral task
behavioral29
Sample
thinkpwn
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral30
Sample
xyz
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral31
Sample
zerg
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral32
Sample
zergRush.bak
Resource
debian9-armhf-20231215-en
General
-
Target
KingRoot v1.3 2012.12.21.1805/root.sh
-
Size
20B
-
MD5
e9e8127c8fc08b5bb2de1cfda092033d
-
SHA1
88682ed625b3d45f905098a14ec3867e21ea8beb
-
SHA256
e0f4d86b3a2ee22d7ead0efe7bbe5ead669ba368bd5c9029e3ce01ffadcd2274
-
SHA512
59e2e6a006c68f0ea16ff4bd3f0e800f83090621a4a605e1ddbda19b93fff3d250a1ceda87079c51caecc6a0ecaba22136cf3b3606be42488f180c76117be55b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1980 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1980 AcroRd32.exe 1980 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2840 1992 cmd.exe 29 PID 1992 wrote to memory of 2840 1992 cmd.exe 29 PID 1992 wrote to memory of 2840 1992 cmd.exe 29 PID 2840 wrote to memory of 1980 2840 rundll32.exe 30 PID 2840 wrote to memory of 1980 2840 rundll32.exe 30 PID 2840 wrote to memory of 1980 2840 rundll32.exe 30 PID 2840 wrote to memory of 1980 2840 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\KingRoot v1.3 2012.12.21.1805\root.sh"1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\KingRoot v1.3 2012.12.21.1805\root.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\KingRoot v1.3 2012.12.21.1805\root.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59748f23130d588e2183761c2e48356b1
SHA181965440aeb167cef480bc9ba0ec10e1ad7373dd
SHA25673c24e0ee00c479f1c3190f7c8c6964fb67733bd26de18a36c5cb69a2985d538
SHA512ddf4c91c917ff16b9c2842881b5a1ca904acadcc3bacb72e1b432ebcb5d3d3a79362156a501f4f772a617ef78efc26329f67dde54fba2219532ed8cb2cd49713