Overview
overview
6Static
static
6AdbWinApi.dll
windows7-x64
3AdbWinApi.dll
windows10-2004-x64
3AdbWinUsbApi.dll
windows7-x64
1AdbWinUsbApi.dll
windows10-2004-x64
3KingRoot.exe
windows7-x64
3KingRoot.exe
windows10-2004-x64
3PluginKingRoot.dll
windows7-x64
1PluginKingRoot.dll
windows10-2004-x64
1adb.exe
windows7-x64
1adb.exe
windows10-2004-x64
1block
debian-9-armhf
busybox
debian-9-armhf
1evil.apk
evil.apk
android-10-x64
1evil.apk
android-11-x64
1exynos-abuse
debian-9-armhf
flood
debian-9-armhf
libboy.apk
libboy.apk
android-10-x64
libboy.apk
android-11-x64
libsu.so
debian-9-armhf
libxy.so
debian-9-armhf
1motofail
debian-9-armhf
rageagainstthecage
debian-9-armhf
1root
debian-9-armhf
root.sh
windows7-x64
3root.sh
windows10-2004-x64
3roottool
debian-9-armhf
su
debian-9-armhf
superuser.apk
thinkpwn
debian-9-armhf
xyz
debian-9-armhf
Analysis
-
max time kernel
117s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
AdbWinApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AdbWinApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
AdbWinUsbApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
AdbWinUsbApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
KingRoot.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
KingRoot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
PluginKingRoot.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
PluginKingRoot.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
adb.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
adb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
block
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral12
Sample
busybox
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral13
Sample
evil.apk
Behavioral task
behavioral14
Sample
evil.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral15
Sample
evil.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral16
Sample
exynos-abuse
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral17
Sample
flood
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral18
Sample
libboy.apk
Behavioral task
behavioral19
Sample
libboy.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral20
Sample
libboy.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral21
Sample
libsu.so
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral22
Sample
libxy.so
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral23
Sample
motofail
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral24
Sample
rageagainstthecage
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral25
Sample
root
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral26
Sample
root.sh
Resource
win7-20231215-en
Behavioral task
behavioral27
Sample
root.sh
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
roottool
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral29
Sample
su
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral30
Sample
superuser.apk
Behavioral task
behavioral31
Sample
thinkpwn
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral32
Sample
xyz
Resource
debian9-armhf-20231215-en
General
-
Target
AdbWinApi.dll
-
Size
94KB
-
MD5
47a6ee3f186b2c2f5057028906bac0c6
-
SHA1
fde9c22a2cfcd5e566cec2e987d942b78a4eeae8
-
SHA256
14a51482aa003db79a400f4b15c158397fe6d57ee6606b3d633fa431a7bfdf4b
-
SHA512
6a2675de0c445c75f7d5664ebe8f0e2f69c3312c50156161e483927e40235140d5e28e340112ac552d6462366143890a8ce32dbf65bd37e27cb1ea290fe14584
-
SSDEEP
1536:npCxybY0FS6MqS6WvgD9xj03TabrFvY5J6sCGt:npo0k6ZWVTaif6sCG
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2052 2392 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 3056 wrote to memory of 2392 3056 rundll32.exe 28 PID 2392 wrote to memory of 2052 2392 rundll32.exe 29 PID 2392 wrote to memory of 2052 2392 rundll32.exe 29 PID 2392 wrote to memory of 2052 2392 rundll32.exe 29 PID 2392 wrote to memory of 2052 2392 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\AdbWinApi.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 2523⤵
- Program crash
PID:2052
-
-