Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    08-11-2021 14:53

General

  • Target

    flowey.exe

  • Size

    587KB

  • MD5

    7cd5b1d26ac2bbcc2d14c9ad93347292

  • SHA1

    ca48b30414d66c6a3014037c9e4433eebc1880b7

  • SHA256

    4970564c582532cd7a5a38f4016e772143c73c4b2f8928100d021a7d3c2e2bc0

  • SHA512

    963705a5c3c29bc25561f2b92552dae3d185d0933319b8843031d421295fcad29c1b23e76b6d9fe5ad4d483228eabf48d71bf31fde1477c98db785c33b3a777d

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\flowey.exe
    "C:\Users\Admin\AppData\Local\Temp\flowey.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1112
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1120
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x324
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:428
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Documents\Are.docx"
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:564

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/564-61-0x0000000000000000-mapping.dmp
      • memory/1056-57-0x0000000072E61000-0x0000000072E64000-memory.dmp
        Filesize

        12KB

      • memory/1056-58-0x00000000708E1000-0x00000000708E3000-memory.dmp
        Filesize

        8KB

      • memory/1056-59-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1056-63-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1112-55-0x0000000075801000-0x0000000075803000-memory.dmp
        Filesize

        8KB

      • memory/1120-56-0x000007FEFC511000-0x000007FEFC513000-memory.dmp
        Filesize

        8KB