Overview
overview
6Static
static
6KingRoot P...ls.dll
windows7-x64
3KingRoot P...ls.dll
windows10-2004-x64
3KingRoot P...pi.dll
windows7-x64
3KingRoot P...pi.dll
windows10-2004-x64
3KingRoot P...pi.dll
windows7-x64
1KingRoot P...pi.dll
windows10-2004-x64
3KingRoot P...db.exe
windows7-x64
1KingRoot P...db.exe
windows10-2004-x64
1block
debian-9-armhf
KingRoot P...usybox
debian-9-armhf
1KingRoot P...il.apk
KingRoot P...il.apk
android-10-x64
KingRoot P...il.apk
android-11-x64
KingRoot P...-abuse
debian-9-armhf
KingRoot P...ot.exe
windows7-x64
1KingRoot P...ot.exe
windows10-2004-x64
1flood
debian-9-armhf
KingRoot P...ot.bat
windows7-x64
1KingRoot P...ot.bat
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 06:54
Static task
static1
Behavioral task
behavioral1
Sample
KingRoot PC 1.5Beta/AdbTools.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
KingRoot PC 1.5Beta/AdbTools.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
KingRoot PC 1.5Beta/AdbWinApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
KingRoot PC 1.5Beta/AdbWinApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
KingRoot PC 1.5Beta/AdbWinUsbApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
KingRoot PC 1.5Beta/AdbWinUsbApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
KingRoot PC 1.5Beta/adb.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
KingRoot PC 1.5Beta/adb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
block
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral10
Sample
KingRoot PC 1.5Beta/busybox
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral11
Sample
KingRoot PC 1.5Beta/evil.apk
Behavioral task
behavioral12
Sample
KingRoot PC 1.5Beta/evil.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral13
Sample
KingRoot PC 1.5Beta/evil.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral14
Sample
KingRoot PC 1.5Beta/exynos-abuse
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral15
Sample
KingRoot PC 1.5Beta/fastboot.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
KingRoot PC 1.5Beta/fastboot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
flood
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral18
Sample
KingRoot PC 1.5Beta/install-root.bat
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
KingRoot PC 1.5Beta/install-root.bat
Resource
win10v2004-20231215-en
General
-
Target
KingRoot PC 1.5Beta/AdbTools.dll
-
Size
91KB
-
MD5
e891fe703e421cf0fab45daa66b6addc
-
SHA1
fcd00a0868ac4a87f8fcc3a969f4a6943e5c63b5
-
SHA256
49fe4dbfdafcb66c1692682ebc98fef9be76fc96f521b3c44b79a92a6faf14b2
-
SHA512
f3d6ee39aad2d39d1d8de2fd985581688f51bff34584510b9ba181c645c1a2aff7ad07e3b08e61f04e2bae7fbfa63ca476999330778c2ea52f09bc1e3bea49fd
-
SSDEEP
1536:DatWuNePW9HgGs3m67E+J3nOyOjPar1iTnLB4D3Ku:U39HiZnOapiB4D3Ku
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3356 2836 WerFault.exe 24 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2836 2744 rundll32.exe 24 PID 2744 wrote to memory of 2836 2744 rundll32.exe 24 PID 2744 wrote to memory of 2836 2744 rundll32.exe 24
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\KingRoot PC 1.5Beta\AdbTools.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\KingRoot PC 1.5Beta\AdbTools.dll",#12⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 6123⤵
- Program crash
PID:3356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2836 -ip 28361⤵PID:1632