🌟
Noel's Cyberkshetra Blogspace
LinkedIn ProfileGithub ProfilePersonal Blogspot
  • Welcome to my Gitbooks Page
  • 💽Let's Defend Blue Team Walkthroughs
    • SOC164 - Suspicious Mshta Behavior Alert
    • SOC147 - SSH Scan Activity Alert
    • SOC146  -  Phishing Mail Detected Alert
    • SOC145 - Ransomware Detected Alert
    • SOC144  -  New scheduled task created Alert
    • SOC143 - Password Stealer Detected Alert
    • SOC141  -  Phishing URL Detected Alert
    • SOC141 - Phishing URL Detected Alert
    • SOC137 — Malicious File/Script Download Attempt: A Walkthrough
    • SOC109  -  Emotet Malware Detected Alert
    • SOC104 - Malware Detected Alert
    • SOC101  -  Phishing Mail Detected Alert
    • HTTP Basic Auth: Let's Defend DFIR Challenge
    • ShellShock Attack: Let’s Defend Challenge
    • 2021’s 0-Day MSHTML: Let's Defend Lab
  • 🤺BTLO Walkthroughs
    • BTLO: Network Analysis-Web Shell Challenge
    • BTLO: Suspicious USB Stick Challenge
  • 💒WiCYS CyberStart
    • Chapter 1 - Amsterdam A Running Start
      • WiCYS CyberStart (Amsterdam) Challenge 1
      • WiCYS CyberStart (Amsterdam) Challenge 2
      • WiCYS CyberStart (Amsterdam) Challenge 3
      • WiCYS CyberStart (Amsterdam) Challenge 4
    • Chapter 2 - Tokyo Patterns of Behaviour
      • WiCYS CyberStart (Tokyo) Challenge 1
      • WiCYS CyberStart (Tokyo) Challenge 2
      • WiCYS CyberStart (Tokyo) Challenge 3
      • WiCYS CyberStart (Tokyo) Challenge 4
    • Chapter 3 - Barcelona In the thick of it
      • WiCYS CyberStart (Barcelona) Challenge 1
      • WiCYS CyberStart (Barcelona) Challenge 2
      • WiCYS Cyberstart (Barcelona) Challenge 3
      • WiCYS CyberStart (Barcelona) Challenge 4
  • 📕Technical Cyber articles
    • An in-depth analysis of an Intrusion Prevention System
    • DevSecOps-Making a difference from traditional DevOps
    • CVE - 2020–1472 (Zerologon Vulnerability)-Exploitation & Remediation
    • Computer Forensics Acquisition
    • Cyber Hygiene Tips
    • Hack your System - Linux Edition
    • Markovian Parallax Denigrate-Breaking the cipher
    • SIEM-Incorporating Incident Response into Network Security
    • Social Engineering-A leading cause for vulnerability occurrence
    • Report Writing in Digital & Multimedia Forensics
    • Zero-Day Vulnerabilities: A short overview
    • Zero Trust Network Access-A solution to Network Security
  • 🧑‍💻Hack The Box : Starting Point Machines
    • Meow
    • Fawn
    • Dancing
    • Redeemer
Powered by GitBook
On this page
  • Introduction to the Alert
  • Playbook Questions
  • Detection of Threat Indicator
  • Check if the malware is quarantined/cleaned
  • Analyzing the Malware sample
  • Check If Someone Requested the C2 Server
  • Adding case artifacts
  • Analyst's Notes
  • Alert Scorecard
  • Summary of the alert
  • Conclusion
  • Your opinion matters
  1. Let's Defend Blue Team Walkthroughs

SOC109  -  Emotet Malware Detected Alert

Malware you say? Let's have a look at it

PreviousSOC137 — Malicious File/Script Download Attempt: A WalkthroughNextSOC104 - Malware Detected Alert

Last updated 3 years ago

Hello, blue teamers and welcome to this blog entry, as I attempt to solve ’s SOC109 — Emotet Malware alert. It was fun to work with real-world malware and trace back its origins and characteristics.

Keep your investigation armor at the ready!

NOTE: Always remember to investigate alerts from Let's Defend, on a VM.

Introduction to the Alert

We are met with the following alert summary, which will prove beneficial as we keep investigating

Proceed to download the 349d13ca99ab03869548d75b99e5a1d0.zip file

Next steps:-

Proceed to take ownership of the case Create case

We receive the incident details, with all necessary information for our investigation

Now, let’s start the playbook

Playbook Questions

Detection of Threat Indicator

To detect the Threat Indicator, let’s first analyze the attached zip sample

Upon unzipping it, we get a file named ‘1word.doc’

Two .exe files execute as we open it (namely powershell.exe and ntvdm.exe)

What does the PowerShell file do?

Expanding the log to find more information, we get:-

Check if the malware is quarantined/cleaned

Go to the ‘Endpoint Security section and contain the victim host(RichardPRD)

A) Quarantined

Analyzing the Malware sample

Q) Analyze malware in 3rd party tools and find C2 address

You can use the free products/services below.

AnyRun VirusTotal URLHouse URLScan HybridAnalysis

Let’s enumerate once more, using Anyrun tool

The file is malicious

A) Malicious

Check If Someone Requested the C2 Server

Q) Please go to the “Log Management” page and check if the C2 address accessed. You can check if the malicious file is run by searching the C2 addresses of the malicious file.

Please click “Yes” if someone access the malicious address. Otherwise please click “No” button.

Searching ‘Log Management’, for the victim host, we get 7 connection log entries

We know for a fact that Emotet spreads via phishing emails, so it is wise to limit ourselves to ports 80 and 443 connection attempts

Keeping a note of these IP’s, let’s see the related IP Addresses that have been contacted from this malicious file(can be received from the ‘Relations’ tab under VirusTotal)

We can safely assume that the C2 Server was never accessed because none of the IP’s match with the ones found in the Log Management section

A) Not accessed

Adding case artifacts

From Hybrid-Analysis, let’s note down outgoing traffic from this malicious file, to be added to our collection of artifacts

This finally boils down to:-

Analyst's Notes

We fill in the necessary details

Finish the playbook

Alert Scorecard

Not bad, not bad at all!

Every alert solved is a step towards perfection and I am pretty happy with the score I received.

Summary of the alert

A phishing mail was sent from the source, disguised as a harmless document, which the receiver did not fall victim to. The attachment was responsibly analyzed and determined to have connections to the Emotet malware

The case was a true positive for a phishing attack and the analyst responsibly provided artifacts and notes, discussing the case characteristics and results.

Conclusion

Thank you for reading this blog entry, and stay tuned as I try to close down more SOC alerts……

Your opinion matters

My audience has a voice. Feel free to reach out to me, on my socials (links are on top of this page) for any queries to be addressed. Dropping a sweet message would make my day

Let your opinion about this write-up be known, by selecting any one of the emojis below!

It would be wise to open it on

From my , I found that Emotet uses disposable C2 servers to propagate

💽
Anyrun
research
Let’s Defend