Overview
overview
10Static
static
10LiquidBoun...or.exe
windows10-ltsc 2021-x64
10LiquidBoun...64.exe
windows10-ltsc 2021-x64
8$PLUGINSDI...nu.dll
windows10-ltsc 2021-x64
3$PLUGINSDI...em.dll
windows10-ltsc 2021-x64
3$PLUGINSDI...gs.dll
windows10-ltsc 2021-x64
3$PLUGINSDI...ls.dll
windows10-ltsc 2021-x64
3$TEMP/Micr...up.exe
windows10-ltsc 2021-x64
6liquidlauncher.exe
windows10-ltsc 2021-x64
1uninstall.exe
windows10-ltsc 2021-x64
7$PLUGINSDI...LL.dll
windows10-ltsc 2021-x64
3$PLUGINSDI...em.dll
windows10-ltsc 2021-x64
3$PLUGINSDI...ls.dll
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
30s -
max time network
25s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06-02-2025 15:09
Behavioral task
behavioral1
Sample
LiquidBounce 2025/Liquid Bounce Injector.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral2
Sample
LiquidBounce 2025/LiquidLauncher_0.4.0_x64.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral7
Sample
$TEMP/MicrosoftEdgeWebview2Setup.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral8
Sample
liquidlauncher.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral9
Sample
uninstall.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10ltsc2021-20250128-en
General
-
Target
LiquidBounce 2025/Liquid Bounce Injector.exe
-
Size
349KB
-
MD5
1166bb4123351851bd9a283654a51cf2
-
SHA1
2c53441f4df33453c26474fc3a01815d466b7ac6
-
SHA256
5dc4cef5041077ed2feef605b9db580efe0b3bcc86823aef08ab3da19c5e8797
-
SHA512
c62b8c3bf41ca424fe2e5e37057bae1273d533270e52a11e72aca3a35c67fc90fad4aaeb92317fe4c72e7480ebed14e5e9099f254a1beb24fe1c9c4131b86687
-
SSDEEP
6144:XcNYS996KFifeVjBpeExgVTFSXFoMc5RhCaL37Jeb:XcW7KEZlPzCy378b
Malware Config
Extracted
darkcomet
Guest16
j4n6foy.localto.net:2596
DC_MUTEX-1R3S01Q
-
gencode
k7nfzKERaShh
-
install
false
-
offline_keylogger
true
-
persistence
false
Signatures
-
Darkcomet family
-
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/4440-0-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral1/memory/4440-2-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral1/memory/4440-4-0x0000000000400000-0x00000000004E8000-memory.dmp upx behavioral1/memory/4440-5-0x0000000000400000-0x00000000004E8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Liquid Bounce Injector.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4440 Liquid Bounce Injector.exe Token: SeSecurityPrivilege 4440 Liquid Bounce Injector.exe Token: SeTakeOwnershipPrivilege 4440 Liquid Bounce Injector.exe Token: SeLoadDriverPrivilege 4440 Liquid Bounce Injector.exe Token: SeSystemProfilePrivilege 4440 Liquid Bounce Injector.exe Token: SeSystemtimePrivilege 4440 Liquid Bounce Injector.exe Token: SeProfSingleProcessPrivilege 4440 Liquid Bounce Injector.exe Token: SeIncBasePriorityPrivilege 4440 Liquid Bounce Injector.exe Token: SeCreatePagefilePrivilege 4440 Liquid Bounce Injector.exe Token: SeBackupPrivilege 4440 Liquid Bounce Injector.exe Token: SeRestorePrivilege 4440 Liquid Bounce Injector.exe Token: SeShutdownPrivilege 4440 Liquid Bounce Injector.exe Token: SeDebugPrivilege 4440 Liquid Bounce Injector.exe Token: SeSystemEnvironmentPrivilege 4440 Liquid Bounce Injector.exe Token: SeChangeNotifyPrivilege 4440 Liquid Bounce Injector.exe Token: SeRemoteShutdownPrivilege 4440 Liquid Bounce Injector.exe Token: SeUndockPrivilege 4440 Liquid Bounce Injector.exe Token: SeManageVolumePrivilege 4440 Liquid Bounce Injector.exe Token: SeImpersonatePrivilege 4440 Liquid Bounce Injector.exe Token: SeCreateGlobalPrivilege 4440 Liquid Bounce Injector.exe Token: 33 4440 Liquid Bounce Injector.exe Token: 34 4440 Liquid Bounce Injector.exe Token: 35 4440 Liquid Bounce Injector.exe Token: 36 4440 Liquid Bounce Injector.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4440 Liquid Bounce Injector.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LiquidBounce 2025\Liquid Bounce Injector.exe"C:\Users\Admin\AppData\Local\Temp\LiquidBounce 2025\Liquid Bounce Injector.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4440