Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
18/10/2022, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
FlaktGroup_VPN_Crayon_support.ps1
Resource
win7-20220901-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
FlaktGroup_VPN_Crayon_support.ps1
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
FlaktGroup_VPN_Crayon_support.ps1
-
Size
1KB
-
MD5
19d50f0efb71e301b110111d717abf43
-
SHA1
88b1ecf92229acebf87723b6828f4a9fec5ee046
-
SHA256
4c727d3ef82442c0f5a841f3668bbd7670391856da904087ec20601b91a80a9f
-
SHA512
048ec6c0232f7e7222c4174239bdefc84e7d88f022eb368ba2a238a6c86068d9b158d1eb33f1231b88920b6c680abb7c54eedeb2c05ba405a488139b05d32d3c
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2016 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2016 powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\FlaktGroup_VPN_Crayon_support.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
C:\Windows\system32\rasphone.exe"C:\Windows\system32\rasphone.exe" -d "FlaktGroup VPN"1⤵PID:1472