Analysis

  • max time kernel
    633s
  • max time network
    699s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    16-03-2022 16:53

General

  • Target

    Bloom/Bloom.exe

  • Size

    128.1MB

  • MD5

    f63db3a6edfd4f8f05df0177ff7ff37e

  • SHA1

    4646fcc9ca0439a92808cee929e765b973e446bf

  • SHA256

    67bf2ce59ed92dc407465402f3f9494f4f4db57771c8e0690d9884efdb40f265

  • SHA512

    fe0406363d195e20a267360790a4c34bdaac1b518c3fbdedb8081c817b850d9461e45cf06dfed50d000d37994124d8668e6e06c89b16d8c7a4ca7138c6545de4

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 3 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
    "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:504
    • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
      C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Bloom\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\Admin\AppData\Local\Bloom\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Bloom\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Bloom\User Data" --annotation=plat=Win64 --annotation=prod=Bloom --annotation=ver=0.0.2 --initial-client-data=0x200,0x204,0x208,0x1ac,0x20c,0x7ffd3c969ec0,0x7ffd3c969ed0,0x7ffd3c969ee0
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:776
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Bloom\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Bloom\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=Bloom --annotation=ver=0.0.2 --initial-client-data=0x1b8,0x1bc,0x1c0,0x13c,0x1c4,0x7ff6a3f34e60,0x7ff6a3f34e70,0x7ff6a3f34e80
        3⤵
          PID:60
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=gpu-process --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1624 /prefetch:2
        2⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:4048
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --lang=en-US --service-sandbox-type=network --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --mojo-platform-channel-handle=1924 /prefetch:8
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:4936
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --mojo-platform-channel-handle=2160 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3796
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=renderer --no-sandbox --file-url-path-alias="/gen=C:\Users\Admin\AppData\Local\Temp\Bloom\gen" --js-flags=--expose-gc --no-zygote --register-pepper-plugins=widevinecdmadapter.dll;application/x-ppapi-widevine-cdm --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --disable-gpu-compositing --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --nwjs --extension-process --enable-auto-reload --ppapi-flash-path=pepflashplayer.dll --ppapi-flash-version=32.0.0.223 --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --mojo-platform-channel-handle=2544 /prefetch:1
        2⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        PID:1924
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=gpu-process --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1952 /prefetch:2
        2⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:4652
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=gpu-process --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --no-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --start-stack-profiler --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2828 /prefetch:2
        2⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:1340
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --mojo-platform-channel-handle=3516 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2248
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --mojo-platform-channel-handle=3672 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1936
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --mojo-platform-channel-handle=3476 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:700
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --mojo-platform-channel-handle=2980 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4576
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --lang=en-US --service-sandbox-type=none --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --mojo-platform-channel-handle=2256 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3448
      • C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe
        "C:\Users\Admin\AppData\Local\Temp\Bloom\Bloom.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,12240486565923979365,17918754079190484827,131072 --lang=en-US --service-sandbox-type=utility --no-sandbox --enable-audio-service-sandbox --user-data-dir="C:\Users\Admin\AppData\Local\Bloom\User Data" --nwapp-path="C:\Users\Admin\AppData\Local\Temp\nw504_425572876" --mojo-platform-channel-handle=1956 /prefetch:8
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:816
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      1⤵
      • Modifies data under HKEY_USERS
      PID:1908

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1908-135-0x000001A1F62C0000-0x000001A1F62C4000-memory.dmp

      Filesize

      16KB

    • memory/1908-131-0x000001A1F3340000-0x000001A1F3350000-memory.dmp

      Filesize

      64KB

    • memory/1908-132-0x000001A1F33A0000-0x000001A1F33B0000-memory.dmp

      Filesize

      64KB

    • memory/1908-191-0x000001A1F6570000-0x000001A1F6574000-memory.dmp

      Filesize

      16KB

    • memory/1908-192-0x000001A1F6550000-0x000001A1F6551000-memory.dmp

      Filesize

      4KB

    • memory/1908-193-0x000001A1F62F0000-0x000001A1F62F4000-memory.dmp

      Filesize

      16KB

    • memory/1908-194-0x000001A1F62E0000-0x000001A1F62E1000-memory.dmp

      Filesize

      4KB

    • memory/1908-195-0x000001A1F62E0000-0x000001A1F62E4000-memory.dmp

      Filesize

      16KB

    • memory/1908-196-0x000001A1F3FE0000-0x000001A1F3FE1000-memory.dmp

      Filesize

      4KB

    • memory/1924-136-0x0000686300040000-0x0000686300041000-memory.dmp

      Filesize

      4KB