Overview
overview
6Static
static
6KingRoot P...ls.dll
windows7-x64
3KingRoot P...ls.dll
windows10-2004-x64
3KingRoot P...pi.dll
windows7-x64
3KingRoot P...pi.dll
windows10-2004-x64
3KingRoot P...pi.dll
windows7-x64
1KingRoot P...pi.dll
windows10-2004-x64
3KingRoot P...db.exe
windows7-x64
1KingRoot P...db.exe
windows10-2004-x64
1block
debian-9-armhf
KingRoot P...usybox
debian-9-armhf
1KingRoot P...il.apk
KingRoot P...il.apk
android-10-x64
KingRoot P...il.apk
android-11-x64
KingRoot P...-abuse
debian-9-armhf
KingRoot P...ot.exe
windows7-x64
1KingRoot P...ot.exe
windows10-2004-x64
1flood
debian-9-armhf
KingRoot P...ot.bat
windows7-x64
1KingRoot P...ot.bat
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 06:54
Static task
static1
Behavioral task
behavioral1
Sample
KingRoot PC 1.5Beta/AdbTools.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
KingRoot PC 1.5Beta/AdbTools.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
KingRoot PC 1.5Beta/AdbWinApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
KingRoot PC 1.5Beta/AdbWinApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
KingRoot PC 1.5Beta/AdbWinUsbApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
KingRoot PC 1.5Beta/AdbWinUsbApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
KingRoot PC 1.5Beta/adb.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
KingRoot PC 1.5Beta/adb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
block
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral10
Sample
KingRoot PC 1.5Beta/busybox
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral11
Sample
KingRoot PC 1.5Beta/evil.apk
Behavioral task
behavioral12
Sample
KingRoot PC 1.5Beta/evil.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral13
Sample
KingRoot PC 1.5Beta/evil.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral14
Sample
KingRoot PC 1.5Beta/exynos-abuse
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral15
Sample
KingRoot PC 1.5Beta/fastboot.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
KingRoot PC 1.5Beta/fastboot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
flood
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral18
Sample
KingRoot PC 1.5Beta/install-root.bat
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
KingRoot PC 1.5Beta/install-root.bat
Resource
win10v2004-20231215-en
General
-
Target
KingRoot PC 1.5Beta/install-root.bat
-
Size
255B
-
MD5
b4c8c9780429b6e66875849b7f9bfaca
-
SHA1
23bb0fc1ea3de918789c95d98efa563571633b35
-
SHA256
8a9846b37e85e0cae2a450e020d4019f6d92110f6f6712afd1238127eb96e400
-
SHA512
7020379fac2435caeda41a5f27865cb36f38681a564dfb284c99a48f3e0bc697b8fe41f60bbe3eca1e134d05d39e443ccafef4e5d6559c8e0a267805ddd5c849
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2288 wrote to memory of 992 2288 cmd.exe 89 PID 2288 wrote to memory of 992 2288 cmd.exe 89 PID 2288 wrote to memory of 992 2288 cmd.exe 89 PID 992 wrote to memory of 776 992 adb.exe 93 PID 992 wrote to memory of 776 992 adb.exe 93 PID 992 wrote to memory of 776 992 adb.exe 93
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KingRoot PC 1.5Beta\install-root.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\KingRoot PC 1.5Beta\adb.exeadb wait-for-device2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\KingRoot PC 1.5Beta\adb.exeadb fork-server server3⤵PID:776
-
-