Overview
overview
10Static
static
10Install.lnk
windows7_x64
3Install.lnk
windows10-2004_x64
3Bloom/Bloom.exe
windows7_x64
1Bloom/Bloom.exe
windows10-2004_x64
7Bloom/d3dc...47.dll
windows7_x64
3Bloom/d3dc...47.dll
windows10-2004_x64
1Bloom/ffmpeg.dll
windows7_x64
1Bloom/ffmpeg.dll
windows10-2004_x64
1Bloom/libEGL.dll
windows7_x64
1Bloom/libEGL.dll
windows10-2004_x64
1Bloom/libGLESv2.dll
windows7_x64
3Bloom/libGLESv2.dll
windows10-2004_x64
3Bloom/node.dll
windows7_x64
1Bloom/node.dll
windows10-2004_x64
1Bloom/nw.dll
windows7_x64
3Bloom/nw.dll
windows10-2004_x64
3Bloom/nw_elf.dll
windows7_x64
1Bloom/nw_elf.dll
windows10-2004_x64
1resources.bat
windows7_x64
6resources.bat
windows10-2004_x64
10Analysis
-
max time kernel
588s -
max time network
646s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
16-03-2022 16:53
Static task
static1
Behavioral task
behavioral1
Sample
Install.lnk
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
Install.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
Bloom/Bloom.exe
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
Bloom/Bloom.exe
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
Bloom/d3dcompiler_47.dll
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
Bloom/d3dcompiler_47.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
Bloom/ffmpeg.dll
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
Bloom/ffmpeg.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
Bloom/libEGL.dll
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
Bloom/libEGL.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
Bloom/libGLESv2.dll
Resource
win7-20220310-en
Behavioral task
behavioral12
Sample
Bloom/libGLESv2.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral13
Sample
Bloom/node.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
Bloom/node.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
Bloom/nw.dll
Resource
win7-20220310-en
Behavioral task
behavioral16
Sample
Bloom/nw.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
Bloom/nw_elf.dll
Resource
win7-20220311-en
Behavioral task
behavioral18
Sample
Bloom/nw_elf.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral19
Sample
resources.bat
Resource
win7-20220311-en
Behavioral task
behavioral20
Sample
resources.bat
Resource
win10v2004-20220310-en
General
-
Target
resources.bat
-
Size
293B
-
MD5
8bfb2637eb0b51909955e765bf8b14fe
-
SHA1
fe1b7da9e9c69739648352024675c65f211f9632
-
SHA256
b6cd6969d9ad5d0711bd350b800e7a3c26df31d37f4c9631670e259a8d0bd882
-
SHA512
9b4681f0508ca81545b877b20f33ccfadc6e093715b9fa730f521a36f2ab7ac1faf4ba961c76409fcbd7a5df90955e18fbe8f88138c3841afa7fcb654871bcd8
Malware Config
Signatures
-
PlugX Rat Payload 10 IoCs
resource yara_rule behavioral20/files/0x0004000000020681-138.dat PlugX behavioral20/files/0x0004000000020681-139.dat PlugX behavioral20/files/0x0004000000020681-159.dat PlugX behavioral20/files/0x0004000000020681-157.dat PlugX behavioral20/files/0x0004000000020681-161.dat PlugX behavioral20/files/0x0004000000020681-168.dat PlugX behavioral20/files/0x0004000000020681-176.dat PlugX behavioral20/files/0x0004000000020681-181.dat PlugX behavioral20/files/0x0004000000020681-185.dat PlugX behavioral20/files/0x0004000000020681-189.dat PlugX -
Executes dropped EXE 12 IoCs
pid Process 2296 Bloom.exe 2624 Bloom.exe 4776 Bloom.exe 2752 Bloom.exe 4756 Bloom.exe 3016 Bloom.exe 4696 Bloom.exe 1792 Bloom.exe 4092 Bloom.exe 3168 Bloom.exe 4404 Bloom.exe 4600 Bloom.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation Bloom.exe Key value queried \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Control Panel\International\Geo\Nation Bloom.exe -
Loads dropped DLL 37 IoCs
pid Process 2296 Bloom.exe 2296 Bloom.exe 2296 Bloom.exe 2624 Bloom.exe 4776 Bloom.exe 2752 Bloom.exe 4756 Bloom.exe 2752 Bloom.exe 2752 Bloom.exe 4756 Bloom.exe 4756 Bloom.exe 4776 Bloom.exe 4776 Bloom.exe 3016 Bloom.exe 4776 Bloom.exe 3016 Bloom.exe 3016 Bloom.exe 3016 Bloom.exe 4696 Bloom.exe 4696 Bloom.exe 4696 Bloom.exe 4696 Bloom.exe 1792 Bloom.exe 1792 Bloom.exe 1792 Bloom.exe 4092 Bloom.exe 4092 Bloom.exe 4092 Bloom.exe 3168 Bloom.exe 3168 Bloom.exe 3168 Bloom.exe 4404 Bloom.exe 4404 Bloom.exe 4404 Bloom.exe 4600 Bloom.exe 4600 Bloom.exe 4600 Bloom.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Bloom = "C:\\Users\\Admin\\AppData\\Roaming\\Bloom\\Bloom.exe --qyS7" reg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{ACEAEE28-A864-42DD-BCC2-790E3262CD32}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{EFC49FCF-7491-477E-8E02-1F7B262A9ACD}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2403053463-4052593947-3703345493-1000\{AC1CB510-FC4F-4D76-9851-8426EE927A37} Bloom.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2403053463-4052593947-3703345493-1000\{C1D01258-C010-4DC7-AEF5-B0112C310D29} Bloom.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2752 Bloom.exe 2752 Bloom.exe 4776 Bloom.exe 4776 Bloom.exe 4756 Bloom.exe 4756 Bloom.exe 2296 Bloom.exe 2296 Bloom.exe 3016 Bloom.exe 3016 Bloom.exe 4696 Bloom.exe 4696 Bloom.exe 1792 Bloom.exe 1792 Bloom.exe 4092 Bloom.exe 4092 Bloom.exe 3168 Bloom.exe 3168 Bloom.exe 4404 Bloom.exe 4404 Bloom.exe 4600 Bloom.exe 4600 Bloom.exe 2296 Bloom.exe 2296 Bloom.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 Bloom.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3168 wrote to memory of 212 3168 cmd.exe 87 PID 3168 wrote to memory of 212 3168 cmd.exe 87 PID 3168 wrote to memory of 2788 3168 cmd.exe 88 PID 3168 wrote to memory of 2788 3168 cmd.exe 88 PID 3168 wrote to memory of 1808 3168 cmd.exe 89 PID 3168 wrote to memory of 1808 3168 cmd.exe 89 PID 3168 wrote to memory of 2296 3168 cmd.exe 91 PID 3168 wrote to memory of 2296 3168 cmd.exe 91 PID 2296 wrote to memory of 2624 2296 Bloom.exe 95 PID 2296 wrote to memory of 2624 2296 Bloom.exe 95 PID 2296 wrote to memory of 4776 2296 Bloom.exe 96 PID 2296 wrote to memory of 4776 2296 Bloom.exe 96 PID 2296 wrote to memory of 2752 2296 Bloom.exe 98 PID 2296 wrote to memory of 2752 2296 Bloom.exe 98 PID 2296 wrote to memory of 4756 2296 Bloom.exe 97 PID 2296 wrote to memory of 4756 2296 Bloom.exe 97 PID 2296 wrote to memory of 3016 2296 Bloom.exe 99 PID 2296 wrote to memory of 3016 2296 Bloom.exe 99 PID 2296 wrote to memory of 4696 2296 Bloom.exe 101 PID 2296 wrote to memory of 4696 2296 Bloom.exe 101 PID 2296 wrote to memory of 1792 2296 Bloom.exe 102 PID 2296 wrote to memory of 1792 2296 Bloom.exe 102 PID 2296 wrote to memory of 4092 2296 Bloom.exe 103 PID 2296 wrote to memory of 4092 2296 Bloom.exe 103 PID 2296 wrote to memory of 3168 2296 Bloom.exe 104 PID 2296 wrote to memory of 3168 2296 Bloom.exe 104 PID 2296 wrote to memory of 4404 2296 Bloom.exe 105 PID 2296 wrote to memory of 4404 2296 Bloom.exe 105 PID 2296 wrote to memory of 4600 2296 Bloom.exe 106 PID 2296 wrote to memory of 4600 2296 Bloom.exe 106
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\resources.bat"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\system32\tar.exetar -xvf "app.zip" -C "C:\Users\Admin\AppData\Roaming"2⤵PID:212
-
-
C:\Windows\system32\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v Bloom /f2⤵PID:2788
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v Bloom /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe --qyS7" /f2⤵
- Adds Run key to start application
PID:1808
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exeC:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Bloom\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Bloom\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Bloom\User Data" --annotation=plat=Win64 --annotation=prod=Bloom --annotation=ver=0.0.2 --initial-client-data=0x204,0x208,0x20c,0x1c8,0x210,0x7ffb69e99ec0,0x7ffb69e99ed0,0x7ffb69e99ee03⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2624
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe" --type=gpu-process --field-trial-handle=1692,7410571488684497181,6701078849341615436,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2296_1678435841" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1696 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1692,7410571488684497181,6701078849341615436,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2296_1678435841" --mojo-platform-channel-handle=2200 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1692,7410571488684497181,6701078849341615436,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2296_1678435841" --mojo-platform-channel-handle=2168 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Roaming\Bloom\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1692,7410571488684497181,6701078849341615436,131072 --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2296_1678435841" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2776 /prefetch:13⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe" --type=gpu-process --field-trial-handle=1692,7410571488684497181,6701078849341615436,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2296_1678435841" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2140 /prefetch:23⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1692,7410571488684497181,6701078849341615436,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2296_1678435841" --mojo-platform-channel-handle=1816 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1692,7410571488684497181,6701078849341615436,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2296_1678435841" --mojo-platform-channel-handle=3480 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1692,7410571488684497181,6701078849341615436,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2296_1678435841" --mojo-platform-channel-handle=3316 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1692,7410571488684497181,6701078849341615436,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2296_1678435841" --mojo-platform-channel-handle=2296 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe"C:\Users\Admin\AppData\Roaming\Bloom\Bloom.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1692,7410571488684497181,6701078849341615436,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw2296_1678435841" --mojo-platform-channel-handle=2592 /prefetch:83⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:2580