Overview
overview
7Static
static
7Annelids O...11.apk
android-9-x86
12D.map
windows7-x64
32D.map
windows10-2004-x64
32D.mapinfo
windows7-x64
32D.mapinfo
windows10-2004-x64
32D.webp
windows7-x64
32D.webp
windows10-2004-x64
4Play-Bold.ttf
windows7-x64
3Play-Bold.ttf
windows10-2004-x64
7Play-Regular.ttf
windows7-x64
3Play-Regular.ttf
windows10-2004-x64
7annelids.rcss
windows7-x64
3annelids.rcss
windows10-2004-x64
3ask_for_rating.rml
windows7-x64
3ask_for_rating.rml
windows10-2004-x64
3background.frag
windows7-x64
3background.frag
windows10-2004-x64
3background.vert
windows7-x64
3background.vert
windows10-2004-x64
3background.webp
windows7-x64
3background.webp
windows10-2004-x64
4background_2d.frag
windows7-x64
3background_2d.frag
windows10-2004-x64
3background...r.frag
windows7-x64
3background...r.frag
windows10-2004-x64
3background...r.vert
windows7-x64
3background...r.vert
windows10-2004-x64
3background_city.frag
windows7-x64
3background_city.frag
windows10-2004-x64
3background_decal.frag
windows7-x64
3background_decal.frag
windows10-2004-x64
3background_decal.vert
windows7-x64
3Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2023 23:27
Static task
static1
Behavioral task
behavioral1
Sample
Annelids Online battle_v1.115.11.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
2D.map
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
2D.map
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
2D.mapinfo
Resource
win7-20230220-en
Behavioral task
behavioral5
Sample
2D.mapinfo
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
2D.webp
Resource
win7-20230220-en
Behavioral task
behavioral7
Sample
2D.webp
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Play-Bold.ttf
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
Play-Bold.ttf
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
Play-Regular.ttf
Resource
win7-20230220-en
Behavioral task
behavioral11
Sample
Play-Regular.ttf
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
annelids.rcss
Resource
win7-20230220-en
Behavioral task
behavioral13
Sample
annelids.rcss
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
ask_for_rating.rml
Resource
win7-20230220-en
Behavioral task
behavioral15
Sample
ask_for_rating.rml
Resource
win10v2004-20230221-en
Behavioral task
behavioral16
Sample
background.frag
Resource
win7-20230220-en
Behavioral task
behavioral17
Sample
background.frag
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
background.vert
Resource
win7-20230220-en
Behavioral task
behavioral19
Sample
background.vert
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
background.webp
Resource
win7-20230220-en
Behavioral task
behavioral21
Sample
background.webp
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
background_2d.frag
Resource
win7-20230220-en
Behavioral task
behavioral23
Sample
background_2d.frag
Resource
win10v2004-20230220-en
Behavioral task
behavioral24
Sample
background_border.frag
Resource
win7-20230220-en
Behavioral task
behavioral25
Sample
background_border.frag
Resource
win10v2004-20230220-en
Behavioral task
behavioral26
Sample
background_border.vert
Resource
win7-20230220-en
Behavioral task
behavioral27
Sample
background_border.vert
Resource
win10v2004-20230220-en
Behavioral task
behavioral28
Sample
background_city.frag
Resource
win7-20230220-en
Behavioral task
behavioral29
Sample
background_city.frag
Resource
win10v2004-20230220-en
Behavioral task
behavioral30
Sample
background_decal.frag
Resource
win7-20230220-en
Behavioral task
behavioral31
Sample
background_decal.frag
Resource
win10v2004-20230220-en
Behavioral task
behavioral32
Sample
background_decal.vert
Resource
win7-20230220-en
General
-
Target
Play-Bold.ttf
-
Size
213KB
-
MD5
b49c4452371f07f848dcff78ede105bc
-
SHA1
c3cb83242769ccd756da5c83d2a6fd717b89708d
-
SHA256
b0811265d994ebf38ecf28f9a634a3ccf575b68f10d367cdf6105577ee01a4e7
-
SHA512
13ce6821cc816a90f59cc35fe453219c32e391299bfdcfa83e1602214626c490da471aacf359cb9ec95cbe7371bae01ff6ee5eccd2041a5c6796c4adbdaeec43
-
SSDEEP
6144:XZnzgg/JeHd4E/iMdSEKZbPrZJrtOwSegXIb+1oJA:pnG/MERHmy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 1664 wrote to memory of 4852 1664 cmd.exe fontview.exe PID 1664 wrote to memory of 4852 1664 cmd.exe fontview.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Play-Bold.ttf1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Local\Temp\Play-Bold.ttf2⤵