🌟
Noel's Cyberkshetra Blogspace
LinkedIn ProfileGithub ProfilePersonal Blogspot
  • Welcome to my Gitbooks Page
  • 💽Let's Defend Blue Team Walkthroughs
    • SOC164 - Suspicious Mshta Behavior Alert
    • SOC147 - SSH Scan Activity Alert
    • SOC146  -  Phishing Mail Detected Alert
    • SOC145 - Ransomware Detected Alert
    • SOC144  -  New scheduled task created Alert
    • SOC143 - Password Stealer Detected Alert
    • SOC141  -  Phishing URL Detected Alert
    • SOC141 - Phishing URL Detected Alert
    • SOC137 — Malicious File/Script Download Attempt: A Walkthrough
    • SOC109  -  Emotet Malware Detected Alert
    • SOC104 - Malware Detected Alert
    • SOC101  -  Phishing Mail Detected Alert
    • HTTP Basic Auth: Let's Defend DFIR Challenge
    • ShellShock Attack: Let’s Defend Challenge
    • 2021’s 0-Day MSHTML: Let's Defend Lab
  • 🤺BTLO Walkthroughs
    • BTLO: Network Analysis-Web Shell Challenge
    • BTLO: Suspicious USB Stick Challenge
  • 💒WiCYS CyberStart
    • Chapter 1 - Amsterdam A Running Start
      • WiCYS CyberStart (Amsterdam) Challenge 1
      • WiCYS CyberStart (Amsterdam) Challenge 2
      • WiCYS CyberStart (Amsterdam) Challenge 3
      • WiCYS CyberStart (Amsterdam) Challenge 4
    • Chapter 2 - Tokyo Patterns of Behaviour
      • WiCYS CyberStart (Tokyo) Challenge 1
      • WiCYS CyberStart (Tokyo) Challenge 2
      • WiCYS CyberStart (Tokyo) Challenge 3
      • WiCYS CyberStart (Tokyo) Challenge 4
    • Chapter 3 - Barcelona In the thick of it
      • WiCYS CyberStart (Barcelona) Challenge 1
      • WiCYS CyberStart (Barcelona) Challenge 2
      • WiCYS Cyberstart (Barcelona) Challenge 3
      • WiCYS CyberStart (Barcelona) Challenge 4
  • 📕Technical Cyber articles
    • An in-depth analysis of an Intrusion Prevention System
    • DevSecOps-Making a difference from traditional DevOps
    • CVE - 2020–1472 (Zerologon Vulnerability)-Exploitation & Remediation
    • Computer Forensics Acquisition
    • Cyber Hygiene Tips
    • Hack your System - Linux Edition
    • Markovian Parallax Denigrate-Breaking the cipher
    • SIEM-Incorporating Incident Response into Network Security
    • Social Engineering-A leading cause for vulnerability occurrence
    • Report Writing in Digital & Multimedia Forensics
    • Zero-Day Vulnerabilities: A short overview
    • Zero Trust Network Access-A solution to Network Security
  • 🧑‍💻Hack The Box : Starting Point Machines
    • Meow
    • Fawn
    • Dancing
    • Redeemer
Powered by GitBook
On this page
  • Introduction to the Alert
  • Define Threat Indicator
  • Enumeration and Analysis
  • Analysis using VirusTotal
  • Analysis using VirusTotal
  • Check if the malware is quarantined/cleaned
  • Analyze Malware
  • Check If Someone Requested the C2
  • Containment
  • Add Artifacts
  • Analyst Note
  • Alert Scorecard
  • Summary of the alert
  • Conclusion
  • Your opinion matters
  1. Let's Defend Blue Team Walkthroughs

SOC137 — Malicious File/Script Download Attempt: A Walkthrough

Powershell-fuelled malware

PreviousSOC141 - Phishing URL Detected AlertNextSOC109  -  Emotet Malware Detected Alert

Last updated 3 years ago

Welcome blue teamers!

Now, who is ready to do some SOC alert practice? Today I will be guiding you through the SOC 137 (Malicious File/Script Download Attempt) alert.

NOTE: Always remember to investigate alerts from Let’s Defend, on a VM.

Introduction to the Alert

Preceding the investigation, we are given a rundown of the alert summary. It contains vital information that comes in handy later

Take ownership

Create case

Start Playbook

Now, let’s delve into the questions

Define Threat Indicator

Select Threat Indicator

From the alert summary, we can find that the malicious .zip file was downloaded onto the NicolasPRD endpoint, with IP Address — 172.16.17.37

Upon unzipping it, we uncover a file named ‘INVOICE PACKAGE LINK TO DOWNLOAD.docm’

Enumeration and Analysis

Applying Linux’s file command, we determine that the version of Microsoft Word used is from 2007

Process breakdown

From the process tree of the malicious file, we can see that it has a PowerShell executable as a subprocess. The executable is given read permissions, which can be fatal, if not monitored properly.

This becomes evident especially when it has a 95% severity rate of being suspicious

Analysis using VirusTotal

Analysis using VirusTotal

Judging from the evidence and characteristics of the malicious file collected above, we can conclude that the file contacts external domains, through undetected outgoing network traffic

A)Unknown or unexpected outgoing internet traffic

Check if the malware is quarantined/cleaned

I believe that the malware hasn't been quarantined

A)Not Quarrantined

Analyze Malware

Analyze malware in 3rd party tools and find C2 address

You can use the free products/services below.

AnyRun VirusTotal URLHouse URLScan HybridAnalysis

From our analysis, we have concluded that the file is indeed malicious

A)Malicious

Check If Someone Requested the C2

Please go to the “Log Management” page and check if the C2 address accessed. You can check if the malicious file is run by searching the C2 addresses of the malicious file.

Log Management Please click “Yes” if someone access the malicious address. Otherwise please click “No” button.

Let’s look up the source IP Address (172.16.17.37) on the Log Management section

We get 3 corresponding log entries, but none of them relate to the alert or show any reference to the download of a malicious file (as briefed to us)

Using Hybrid-Analysis to pull up the list of contacted hosts, we find the following domains and IP addresses to verify with

None of the IP Addresses match. Hence we can assume that the C2 Server was not contacted. What are we doing wrong here?

Now, for further verification let’s use the Relations tab of VirusTotal (corresponding to the malicious file)

We finally strike gold here.

172.67.200.96 can be labeled as the IP Address of the C2 Server and it has been accessed by the NicolasPRD endpoint (victim host)

A)Accessed

Containment

Please go to the “EDR” page and contain the user machine!

Endpoint Security After containment please click “Next” buttton to finish playbook.

Proceed to contain the NicolasPRD endpoint

Add Artifacts

We have identified the domains contacted by the malicious file, as well as its MD5 hash, from VirusTotal

We proceed to compile this into our Artifacts chart

Analyst Note

Detail this section as much as you can. A good SOC Analyst gives attention to detail.

Finish the playbook Close the alert

Alert Scorecard

Ok, that was unexpected.

Every alert solved is a step towards perfection and I am pretty happy with the score I received.

Summary of the alert

The SOC Analyst was given a zip file, from which a .docm file containing a suspicious link was extracted. This file was subsequently detected and was found to be malicious.IOCs relating to the file, along with contacted hosts were collected, culminating in the containment of the NicolasPRD endpoint (victim host)

Conclusion

Thank you for reading this blog entry, and stay tuned as I try to close down more SOC alerts……

Your opinion matters

My audience has a voice. Feel free to reach out to me, on my socials (links are on top of this page) for any queries to be addressed. Dropping a sweet message would make my day

Let your opinion about this write-up be known, by selecting any one of the emojis below!

It would be wise to give the malicious file a run on . It is much safer that way. Upon uploading, we find its contents below

Making use of , we have received conclusive evidence of the file being malicious. Malicious and Suspicious IOCs have been identified and displayed below

💽
Anyrun
Hybrid-Analysis