Flagpro is used in the initial stage of attacks to investigate target’s environment, download a second stage malware and execute it.
An attack case using Flagpro starts with a spear phishing e-mail.
The message is adjusted to its target organization.
It is disguised as an e-mail communication with target’s business partner.
This means the attackers probed deeper into their target before attacking.
The attackers attach a password protected archived file (ZIP or RAR) to the email, and they write its password in the message.
The archived file includes an xlsm format file and it contains a malicious macro.
If a user activates the macro, a malware will be dropped. They also adjust the contents of the xlsm file to the target.
Therefore, it is not easy to feel at odds with the file sent by the attacker.
After the macro is executed, it creates an EXE file in startup directory.
This EXE file is “Flagpro”.
In the most cases, this created EXE files are named “dwm.exe”.
When the system launches next time, Flagpro, which was placed in startup directory as “dwm.exe”, will be executed.
Flagpro communicates with a C&C server, and it receives commands to execute from the server, or Flagpro downloads a second stage malware and then executes it.
The attackers check the target’s environment whether it is suitable for running the second stage malware or not.
If they determine to attack the target, another malware sample will be downloaded and executed.