Analysis

  • max time kernel
    215s
  • max time network
    218s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2023 19:43

General

  • Target

    LiquidLauncher_0.1.5_x64_en-US.msi

  • Size

    5.9MB

  • MD5

    48b7d0600a9ee279b4c41a1ffa3c020b

  • SHA1

    58f59ef8aedda5702a9047c22de711e97511d415

  • SHA256

    0f66e48e0a14769b4814d854bc38624e631210fa63a845717dbed9661fac8673

  • SHA512

    501369190568e53177b1364d2750d848f92562ca5f28f5ee7a1807aa9773ffc9ff412e6c0f480ec25755cf9eb9c423ad15c2ba5d5046c5735afeb8aaf519c39f

  • SSDEEP

    98304:t5ShYcBqMeETx9j3ZQY1refQKYNWlGLsI5LjOp+ZPR3XQiimt5Gb0COYzatwehIa:qlLtTjZh1reumGLsKSp+ZPxfIcajQe9u

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 10 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\LiquidLauncher_0.1.5_x64_en-US.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:644
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 01FA5804B91268D5612819AE85082CED C
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1904
      • C:\Program Files\LiquidLauncher\LiquidLauncher.exe
        "C:\Program Files\LiquidLauncher\LiquidLauncher.exe"
        3⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4252
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LiquidLauncher.exe --webview-exe-version=0.1.5 --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --lang=en-US --mojo-named-platform-channel-pipe=4252.4836.3542900100756666210
          4⤵
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4888
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=104.0.5112.81 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=104.0.1293.47 --initial-client-data=0x100,0x104,0x108,0xdc,0x110,0x7ffd11888250,0x7ffd11888260,0x7ffd11888270
            5⤵
              PID:4088
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=LiquidLauncher.exe --webview-exe-version=0.1.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 --field-trial-handle=1864,i,5454617421675674327,1034577395533676421,131072 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:2
              5⤵
                PID:4568
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=LiquidLauncher.exe --webview-exe-version=0.1.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2072 --field-trial-handle=1864,i,5454617421675674327,1034577395533676421,131072 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:3
                5⤵
                  PID:384
                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe
                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=LiquidLauncher.exe --webview-exe-version=0.1.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=2264 --field-trial-handle=1864,i,5454617421675674327,1034577395533676421,131072 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:8
                  5⤵
                    PID:3532
                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe
                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=LiquidLauncher.exe --webview-exe-version=0.1.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --display-capture-permissions-policy-allowed --js-flags=--ms-user-locale= --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1864,i,5454617421675674327,1034577395533676421,131072 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:1
                    5⤵
                      PID:4216
                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe
                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=entity_extraction --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=LiquidLauncher.exe --webview-exe-version=0.1.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=4292 --field-trial-handle=1864,i,5454617421675674327,1034577395533676421,131072 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:8
                      5⤵
                        PID:1888
                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe
                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\104.0.1293.47\msedgewebview2.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView" --webview-exe-name=LiquidLauncher.exe --webview-exe-version=0.1.5 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --mojo-platform-channel-handle=4048 --field-trial-handle=1864,i,5454617421675674327,1034577395533676421,131072 --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI /prefetch:8
                        5⤵
                          PID:4520
                  • C:\Windows\system32\srtasks.exe
                    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                    2⤵
                      PID:4368
                  • C:\Windows\system32\vssvc.exe
                    C:\Windows\system32\vssvc.exe
                    1⤵
                    • Checks SCSI registry key(s)
                    PID:2444

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Discovery

                  System Information Discovery

                  4
                  T1082

                  Query Registry

                  3
                  T1012

                  Peripheral Device Discovery

                  2
                  T1120

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files\LiquidLauncher\LiquidLauncher.exe
                    Filesize

                    14.8MB

                    MD5

                    5bab4c9c2f9dcc592091c3d38a5a1ddc

                    SHA1

                    eeb42e4463849f2f4be4105efd9afb62c4a985fb

                    SHA256

                    1ac7a2c296dcf73d971e6879c2e4b6d31ce4f6730be7ca9f27ec67ca04452ff1

                    SHA512

                    740ade153912d05bf1a47a043b710d905149ecffa371b2bdb8947a14a72fc414a8c3e8563af7fa03ff64b4a07c86cae127747033b4b7abe8f33e63a83c9775d3

                  • C:\Program Files\LiquidLauncher\LiquidLauncher.exe
                    Filesize

                    14.8MB

                    MD5

                    5bab4c9c2f9dcc592091c3d38a5a1ddc

                    SHA1

                    eeb42e4463849f2f4be4105efd9afb62c4a985fb

                    SHA256

                    1ac7a2c296dcf73d971e6879c2e4b6d31ce4f6730be7ca9f27ec67ca04452ff1

                    SHA512

                    740ade153912d05bf1a47a043b710d905149ecffa371b2bdb8947a14a72fc414a8c3e8563af7fa03ff64b4a07c86cae127747033b4b7abe8f33e63a83c9775d3

                  • C:\Users\Admin\AppData\Local\Temp\MSI9C7E.tmp
                    Filesize

                    113KB

                    MD5

                    4fdd16752561cf585fed1506914d73e0

                    SHA1

                    f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424

                    SHA256

                    aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7

                    SHA512

                    3695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600

                  • C:\Users\Admin\AppData\Local\Temp\MSI9C7E.tmp
                    Filesize

                    113KB

                    MD5

                    4fdd16752561cf585fed1506914d73e0

                    SHA1

                    f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424

                    SHA256

                    aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7

                    SHA512

                    3695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600

                  • C:\Users\Admin\AppData\Local\Temp\MSIBA15.tmp
                    Filesize

                    211KB

                    MD5

                    a3ae5d86ecf38db9427359ea37a5f646

                    SHA1

                    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                    SHA256

                    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                    SHA512

                    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                  • C:\Users\Admin\AppData\Local\Temp\MSIBA15.tmp
                    Filesize

                    211KB

                    MD5

                    a3ae5d86ecf38db9427359ea37a5f646

                    SHA1

                    eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                    SHA256

                    c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                    SHA512

                    96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                  • C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Crashpad\settings.dat
                    Filesize

                    216B

                    MD5

                    1826913d7777e20ed98ea9f3586c3266

                    SHA1

                    07d34020c55333c44ed20e758998d8fa9cb91c6b

                    SHA256

                    2ba66d6a6b2cd475e413407282ad78985a51161c9be89db254b8a0f41cc7fd2d

                    SHA512

                    0dd16abd3fcb2abd0ecf7ac74993ce868744687d9ec6a89c1a441679b514a8350d3ae26e201b58252c3f3ec33742750f32cf95f99e7620c28230c10c97d33612

                  • C:\Users\Admin\AppData\Local\net.ccbluex.liquidlauncher\EBWebView\Crashpad\throttle_store.dat
                    Filesize

                    20B

                    MD5

                    9e4e94633b73f4a7680240a0ffd6cd2c

                    SHA1

                    e68e02453ce22736169a56fdb59043d33668368f

                    SHA256

                    41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                    SHA512

                    193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                  • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
                    Filesize

                    23.0MB

                    MD5

                    67e2b788432b243a7aaeeab90e7c4513

                    SHA1

                    e74b9cc7b8bff52fde80d2a5f6a55820f0b579ca

                    SHA256

                    689f0a883b61c8f84de7edfff5dff482fe7c3ad727ea09305b4b6f902fa0f919

                    SHA512

                    91d877cbd613291dc2a72b8588ea4096b2e2b9b776ddca44ac55832abee86bcda8553976842134480c37fbd749f0cbbb042db610e1fc65c5a3a9d2405aa784e3

                  • \??\Volume{5d2b4a7c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{768987d5-9916-43ef-9940-65ca501da6a7}_OnDiskSnapshotProp
                    Filesize

                    5KB

                    MD5

                    a3ac128037fb8f77f69b8d5e9995b7f7

                    SHA1

                    74322d344bec09194c703edbf6a4e922076b7a54

                    SHA256

                    4d7bbee380035bd6f6e1c8776409a1f48db5c125ce6c8820c1f4efc6d604e68d

                    SHA512

                    85c700fb3cf2e736a07e67c6c94cd5eb5be063a2716d2d5b16e58e4ebd334de690a41721041a51fca683cce016443e9af238ad4f908e2910ba3d3ed43d38b164

                  • \??\pipe\LOCAL\crashpad_4888_YBXSBBTSOOIBYVAD
                    MD5

                    d41d8cd98f00b204e9800998ecf8427e

                    SHA1

                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                    SHA256

                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                    SHA512

                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                  • memory/384-149-0x0000000000000000-mapping.dmp
                  • memory/1888-156-0x0000000000000000-mapping.dmp
                  • memory/1904-132-0x0000000000000000-mapping.dmp
                  • memory/3532-152-0x0000000000000000-mapping.dmp
                  • memory/4088-144-0x0000000000000000-mapping.dmp
                  • memory/4216-154-0x0000000000000000-mapping.dmp
                  • memory/4252-141-0x0000000000000000-mapping.dmp
                  • memory/4368-135-0x0000000000000000-mapping.dmp
                  • memory/4520-158-0x0000000000000000-mapping.dmp
                  • memory/4568-148-0x0000000000000000-mapping.dmp
                  • memory/4888-143-0x0000000000000000-mapping.dmp