Analysis

  • max time kernel
    31s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 12:41

General

  • Target

    KingRootSetup_v3.5.0.1157_105203.exe

  • Size

    31.7MB

  • MD5

    180c83fd0dc267cecc174675910cec52

  • SHA1

    b68fafef83ee1f6517d214c89c99e3ff231b10b6

  • SHA256

    f194dd9a8f5bc38d58ef17b8a2e08006db1cd0fa59b96c47d68c80796dec2c3b

  • SHA512

    3a8dbfea18eae197f77d39ac159b3caa83f332303e08bffb4755ae82e809775334ca5aca32b106b75eda07b5c6b32a5893f9c642698cdea207e9c7699ad6d2ad

  • SSDEEP

    786432:W7/ts6jmMJSHO2F5gIiliKRj0j8xRiU/7/pe2/:Q/tsoJ6zF5gIOjOUpH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Kills process with taskkill 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KingRootSetup_v3.5.0.1157_105203.exe
    "C:\Users\Admin\AppData\Local\Temp\KingRootSetup_v3.5.0.1157_105203.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\is-AVNE6.tmp\KingRootSetup_v3.5.0.1157_105203.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-AVNE6.tmp\KingRootSetup_v3.5.0.1157_105203.tmp" /SL5="$60154,33024936,69120,C:\Users\Admin\AppData\Local\Temp\KingRootSetup_v3.5.0.1157_105203.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Windows\SysWOW64\taskkill.exe
        "taskkill" /f /im SuInstall.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2720
      • C:\Windows\SysWOW64\taskkill.exe
        "taskkill" /f /im adb.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2708
      • C:\Windows\SysWOW64\taskkill.exe
        "taskkill" /f /im tadb.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2768

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-AVNE6.tmp\KingRootSetup_v3.5.0.1157_105203.tmp

    Filesize

    714KB

    MD5

    625ccc1553eb8e9cc902e5464e0f510f

    SHA1

    67d1ef017729c5893e6812ad866c4bca533a2475

    SHA256

    ef47a78902a24399bea1e1404f429e4b71cfbf4cac8ef94cdcb30cb6c8f739bc

    SHA512

    91aa7309c2d784b5de83ae82cce7c8abcc7c693c9b02a3efeb83bbbcdadb9b41ef734da28fec3651159c20f0cfb41794cd0593b732d691a8117761befd134301

  • \Users\Admin\AppData\Local\Temp\is-RC9QB.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/2240-8-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2240-16-0x0000000000400000-0x00000000004C2000-memory.dmp

    Filesize

    776KB

  • memory/2864-2-0x0000000000401000-0x000000000040C000-memory.dmp

    Filesize

    44KB

  • memory/2864-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2864-15-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB