Code Monkey home page Code Monkey logo

bluelabs's Introduction

Pretium

Scenario

The Security Operations Center at Defense Superior are monitoring a customer’s email gateway and network traffic (Crimeson LLC). One of the SOC team identified some anomalous traffic from Josh Morrison’s workstation, who works as a Junior Financial Controller. When contacted Josh mentioned he received an email from an internal colleague asking him to download an invoice via a hyperlink and review it.

The email read:

There was a rate adjustment for one or more invoices you previously sent to one of our customers. The adjusted invoices can be downloaded via this [link] for your review and payment processing. If you have any questions about the adjustments, please contact me.

Thank you.

Jacob

*Tomlinson, Senior Financial Controller, Crimeson LLC.*The SOC team immediately pulled the email and confirmed it included a link to a malicious executable file. The Security Incident Response Team (SIRT) was activated and you have been assigned to lead the way and help the SOC uncover what happened.You have NetWitness and Wireshark in your toolkit to help find out what happened during this incident.**Reading Material:**

SANS Internet Storm Center SANS Internet Storm Center - A global cooperative cyber threat / internet security monitor and alert system. Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events.SANS Internet Storm Centerisc, sans, internet, security, threat, worm, virus, phishing, hacking, vulnerability

PCAP analysis basics with Wireshark [updated 2021] - Infosec Resources

SANS Internet Storm Center SANS Internet Storm Center - A global cooperative cyber threat / internet security monitor and alert system. Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events.SANS Internet Storm Centerisc, sans, internet, security, threat, worm, virus, phishing, hacking, vulnerability


Writeup

BTLO - Pretium

Question 1

What is the full filename of the initial payload file?

INVOICE_2021937.pdf.bat

Abrimos el pcap en wireshark y como sabemos que fue un empleado interno 192.168.1.9 y nuestro IP es 192.168.1.8 vamos a StadisticsConversation y marcamos cual es el paquerte mas grande que se transferio y le damos right-click para que lo para preparar el filtro que queremos A<->B y le damos enter.

Untitled

Vamos un get con un Invoice.pdf pero tambien tiene la extension poco usual de .bat le vamos a dar right-clickFollowTCP Stream y vamos a ver la conversacion completa

Untitled


Question 2

What is the name of the module used to serve the malicious payload?(4 points)

SimpleHTTPserver

Como podemos ver en el 200 OK de donde bajamos el file podemos ver donde dice Server:

SimpleHTTP/0.6 Python/3.8.5 que es un modulo de Python para montar un server para que bajen cosas como podemos ver en screenshot

Untitled


Question 3

Analysing the traffic, what is the attacker's IP address?(4 points)

192.168.1.9

Como podemos ver en el Pcap y en el GET request bajamos el file de atacante con el IP 192.168.1.9

Untitled


Question 4

Now that you know the payload name and the module used to deliver the malicious files, what is the URL that was embedded in the malicious email?(5 points)

INVOICE_2021937.pdf.bat

Toda esta informacion lo vimos en las anteriores preguntas solo necesitamos juntarlo todo

Untitled


Question 5

Find the PowerShell launcher string (you don’t need to include the base64 encoded script)(5 points)

powershell -noP -sta -w 1 -enc

En mismo sitio encontramos la respuesta a la pregunta

Untitled


Question 6

What is the default user agent being used for communications?(4 points)

Mozilla/5.0

Despues de decryptar la base64 encontramos el User Agent que es Mozilla/5.0

Untitled


Question 7

You are seeing a lot of HTTP traffic. What is the name of a process where malware communicates with a central server asking for instructions at set time intervals?(4 points)

beaconing

Si buscamos como se llama cuando se comunica un a un C2 vamos a ver beaconing

Untitled


Question 8

What is the URI containing ‘login’ that the victim machine is communicating to?(5 points)

/login/process.php

Si buscamos en Wireshark con el filtro http podemos ver que hay un Post request a /login/process.php

Untitled


Question 9

What is the name of the popular post-exploitation framework used for command-and-control communication?(5 points)

Empire

Si buscamos en google podemos ver que la respuesta es Empire

Untitled


Question 10

It is believed that data is being exfiltrated. Investigate and provide the decoded password*(5 points)*

Y0uthinky0ucAnc4tchm3$$

Lo primero que vamos a hacer en Wireshark vamos a usar este filtro icmp && ip.src==192.168.1.8 && ip.dst==192.168.1.9 Vamos a marcar el primer paquete y vamos a File Menu y luego Export Specified Packers y lo guardamos.

Untitled

Despues con T-shark que lo tenemos en la maquina vamos a donde lo tenemos instalado en el CMD y escribimos el siguente comando

``.\tshark.exe -r C:\Users\BTLOTest\Desktop\Investigation<nombre que le pusimos al pcap>.pcap -T fields -e data`

Nos van a salir un monton de hexadecimales como en el screenshot

Untitled

Vamos a copiarlos todos los hexadecimales y los vamos a poner en Cyberchef con estas recetas

Untitled


Question 11

What is the account’s username?(5 points)

$sec-account

En el mismo que descryptamos anteriormente y vimos el password tambien podemo ver el Username que estamos buscando

Untitled

bluelabs's People

Contributors

jorgevillabarreras avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.