HawkEye
HawkEye copied to clipboard
Malware dynamic instrumentation tool based on frida framework

HawkEye
HawkEye is a malware dynamic instrumentation tool based on frida.re framework. It will hook common functions to log malware activities and output the results in a nice web page report.
This is not a sandbox so please use it in a safe sandboxed environment.
Installation
- Install the prerequisites
pip install frida
pip install psutil
- Clone this repository
git clone https://github.com/N1ght-W0lf/HawkEye.git
Usage
usage: HawkEye.py [-h] [--path PATH] [--pid PID]
optional arguments:
-h, --help show this help message and exit
--path PATH File path
--pid PID Process PID
HawkEye runs in 2 modes:
- spawn a malware sample in a new process given its path.
- hook a running process given its PID.
Hooked Functions
Processes:
- CreateProcessInternalW
- OpenProcess
- VirtualAllocEx
Files:
- CreateFile
- WriteFile
- MoveFile
- CopyFile
- DeleteFile
Registry:
- RegCreateKey
- RegOpenKey
- RegQueryValueEx
- RegSetValueEx
- RegDeleteValue
Network:
- InternetOpenUrl
- GetAddrInfo
General:
- LoadLibrary
- GetProcAddress
- CreateMutex
Example Report
I've also uploaded a video for a full report from analysis to final results.