🌟
Noel's Cyberkshetra Blogspace
LinkedIn ProfileGithub ProfilePersonal Blogspot
  • Welcome to my Gitbooks Page
  • 💽Let's Defend Blue Team Walkthroughs
    • SOC164 - Suspicious Mshta Behavior Alert
    • SOC147 - SSH Scan Activity Alert
    • SOC146  -  Phishing Mail Detected Alert
    • SOC145 - Ransomware Detected Alert
    • SOC144  -  New scheduled task created Alert
    • SOC143 - Password Stealer Detected Alert
    • SOC141  -  Phishing URL Detected Alert
    • SOC141 - Phishing URL Detected Alert
    • SOC137 — Malicious File/Script Download Attempt: A Walkthrough
    • SOC109  -  Emotet Malware Detected Alert
    • SOC104 - Malware Detected Alert
    • SOC101  -  Phishing Mail Detected Alert
    • HTTP Basic Auth: Let's Defend DFIR Challenge
    • ShellShock Attack: Let’s Defend Challenge
    • 2021’s 0-Day MSHTML: Let's Defend Lab
  • 🤺BTLO Walkthroughs
    • BTLO: Network Analysis-Web Shell Challenge
    • BTLO: Suspicious USB Stick Challenge
  • 💒WiCYS CyberStart
    • Chapter 1 - Amsterdam A Running Start
      • WiCYS CyberStart (Amsterdam) Challenge 1
      • WiCYS CyberStart (Amsterdam) Challenge 2
      • WiCYS CyberStart (Amsterdam) Challenge 3
      • WiCYS CyberStart (Amsterdam) Challenge 4
    • Chapter 2 - Tokyo Patterns of Behaviour
      • WiCYS CyberStart (Tokyo) Challenge 1
      • WiCYS CyberStart (Tokyo) Challenge 2
      • WiCYS CyberStart (Tokyo) Challenge 3
      • WiCYS CyberStart (Tokyo) Challenge 4
    • Chapter 3 - Barcelona In the thick of it
      • WiCYS CyberStart (Barcelona) Challenge 1
      • WiCYS CyberStart (Barcelona) Challenge 2
      • WiCYS Cyberstart (Barcelona) Challenge 3
      • WiCYS CyberStart (Barcelona) Challenge 4
  • 📕Technical Cyber articles
    • An in-depth analysis of an Intrusion Prevention System
    • DevSecOps-Making a difference from traditional DevOps
    • CVE - 2020–1472 (Zerologon Vulnerability)-Exploitation & Remediation
    • Computer Forensics Acquisition
    • Cyber Hygiene Tips
    • Hack your System - Linux Edition
    • Markovian Parallax Denigrate-Breaking the cipher
    • SIEM-Incorporating Incident Response into Network Security
    • Social Engineering-A leading cause for vulnerability occurrence
    • Report Writing in Digital & Multimedia Forensics
    • Zero-Day Vulnerabilities: A short overview
    • Zero Trust Network Access-A solution to Network Security
  • 🧑‍💻Hack The Box : Starting Point Machines
    • Meow
    • Fawn
    • Dancing
    • Redeemer
Powered by GitBook
On this page
  • Introduction
  • Challenge Questions
  • Conclusion
  • Your opinion matters
  1. Let's Defend Blue Team Walkthroughs

2021’s 0-Day MSHTML: Let's Defend Lab

CVE-2021–40444 Lab

PreviousShellShock Attack: Let’s Defend ChallengeNextBTLO Walkthroughs

Last updated 3 years ago

Hello, budding blue teamers.Welcome to this latest blog entry, where I will be wading deep into the 'Malware Analysis' path on Let's Defend and attempting to solve the lab.

Challenge credits go to and malware sample provision by

Let's analyze some malware!

NOTE: Always remember to investigate challenges from Let's Defend, on a VM.

Introduction

We are given a 'Challenge' file to analyze. Proceed to download the file

Unzip the file, with password: infected

Upon unzipping, we get a directory called ‘Challenge_FIles’, with 4 files

Challenge Questions

Q) Examining the Employees_Contact_Audit_Oct_2021.docx file, what is the malicious IP in the docx file?

Targetting the ‘Employees_Contact_Audit_Oct_2021.docx’ file, let's run a strings search over it

Command — strings Employees_Contact_Audit_Oct_2021.docx

After uploading the file to be analyzed, we can see its malicious level on test sandboxes

Scrolling down, we proceed to check extracted strings from the file 

We can see an IP mentioned here — 175.24.190.249

Scrolling up, we can see the connection traffic from this IP

Since this is the only IP extracted from the malware file, coupled with its suspicious traffic traces, we can confirm this as the answer

A) 175.24.190.249

Q) Examining the Employee_W2_Form.docx file, what is the malicious domain in the docx file?

Running a strings analysis over this file did not reveal the malicious domain that we needed

Uploading this file onto Hybrid-Analysis, we get to see its malicious level

Now observing extracted strings from this file 

A domain by the name arsenal.30cm.tw is found and fits the answer format

A) arsenal.30cm.tw

Q) Examining the Work_From_Home_Survey.doc file, what is the malicious domain in the doc file?

Running the Work_From_Home_Survey.doc file on Hybrid-Analysis

The severity of malicious content is shown below

Reading through the metadata of the file, we can see that the file supposedly contacts a domain

Clicking on ‘View all details’

This means that the domain is malicious

A) trendparlye.com

Q) Examining the income_tax_and_benefit_return_2021.docx, what is the malicious domain in the docx file?

We proceed to run the income_tax_and_benefit_return_2021.docx file on the Hybrid-Analysis tool

Malicious severity of file can be observed below:-

Having a look at the extracted strings section, this file has contacted an external domain too.

Let’s check the domain out - 'hidusi.com'

Looking up the domain on AlienVault 

A) hidusi.com

Q) What is the vulnerability the above files exploited?

Throughout the analysis of each suspicious file, I had been collecting their SHA-256 hashes, which are listed below:-

(Employees_Contact_Audit_Oct_2021.docx)

SHA 256 Hash — 8aaa79ee4a81d02e1023a03aee62a47162a9ff04

(Employee_W2_Form.docx file)

SHA 256 Hash — 00087e46ec0ef6225de59868fd016bd9dd77fa3c

(income_tax_and_benefit_return_2021.docx)

SHA 256 Hash — 9bec2182cc5b41fe8783bb7ab6e577bac5c19f04

(Work_From_Home_Survey.doc)

SHA 256 Hash — 4b35d14a2eab2b3a7e0b40b71955cdd36e06b4b9

Let’s take the help of the hint, to find the answer format

A) CVE-2021–40444

Conclusion

Lookups of real-world malware samples made me enjoy the time spent practicing this room. This will be an almost daily occurrence when eventually stepping into the shoes of a SOC Analyst, which I aspire to be

Thank you for devouring this blog entry and stay tuned as I try to close down more SOC alerts……

Your opinion matters

My audience has a voice. Feel free to reach out to me, on my socials (links are on top of this page) for any queries to be addressed. Dropping a sweet message would make my day

Let your opinion about this write-up be known, by selecting any one of the emojis below!

Unable to find any IP’s from the resulting output, the next resort would be to use the tool

A domain named ‘trendparlye.com’ pops up here Opening ’s assessment on this domain gives us the following information

Running any of these hashes on and checking out the ‘Community’ section gives us the answer that we are dealing with the CVE-2021–40444 known as MSHTML RCE Vulnerability (if it was not already obvious from the title of this challenge!)

💽
Hybrid-Analysis
AlienVault
VirusTotal
2021’s 0-Day MSHTML
Bohan Zhang
MalwareBazaar