Skip to content

Latest commit

 

History

History
81 lines (53 loc) · 1.73 KB

README.md

File metadata and controls

81 lines (53 loc) · 1.73 KB

HawkEye

HawkEye is a malware dynamic instrumentation tool based on frida.re framework. It will hook common functions to log malware activities and output the results in a nice web page report.

This is not a sandbox so please use it in a safe sandboxed environment.

Installation

  • Install the prerequisites
pip install frida
pip install psutil
  • Clone this repository
git clone https://github.com/N1ght-W0lf/HawkEye.git

Usage

usage: HawkEye.py [-h] [--path PATH] [--pid PID]

optional arguments:
  -h, --help   show this help message and exit
  --path PATH  File path
  --pid PID    Process PID

HawkEye runs in 2 modes:

  • spawn a malware sample in a new process given its path.
  • hook a running process given its PID.

Hooked Functions

Processes:

Files:

Registry:

Network:

General:

Example Report

I've also uploaded a video for a full report from analysis to final results.

https://www.youtube.com/watch?v=DnCj2Dt6OcE