🌟
Noel's Cyberkshetra Blogspace
LinkedIn ProfileGithub ProfilePersonal Blogspot
  • Welcome to my Gitbooks Page
  • 💽Let's Defend Blue Team Walkthroughs
    • SOC164 - Suspicious Mshta Behavior Alert
    • SOC147 - SSH Scan Activity Alert
    • SOC146  -  Phishing Mail Detected Alert
    • SOC145 - Ransomware Detected Alert
    • SOC144  -  New scheduled task created Alert
    • SOC143 - Password Stealer Detected Alert
    • SOC141  -  Phishing URL Detected Alert
    • SOC141 - Phishing URL Detected Alert
    • SOC137 — Malicious File/Script Download Attempt: A Walkthrough
    • SOC109  -  Emotet Malware Detected Alert
    • SOC104 - Malware Detected Alert
    • SOC101  -  Phishing Mail Detected Alert
    • HTTP Basic Auth: Let's Defend DFIR Challenge
    • ShellShock Attack: Let’s Defend Challenge
    • 2021’s 0-Day MSHTML: Let's Defend Lab
  • 🤺BTLO Walkthroughs
    • BTLO: Network Analysis-Web Shell Challenge
    • BTLO: Suspicious USB Stick Challenge
  • 💒WiCYS CyberStart
    • Chapter 1 - Amsterdam A Running Start
      • WiCYS CyberStart (Amsterdam) Challenge 1
      • WiCYS CyberStart (Amsterdam) Challenge 2
      • WiCYS CyberStart (Amsterdam) Challenge 3
      • WiCYS CyberStart (Amsterdam) Challenge 4
    • Chapter 2 - Tokyo Patterns of Behaviour
      • WiCYS CyberStart (Tokyo) Challenge 1
      • WiCYS CyberStart (Tokyo) Challenge 2
      • WiCYS CyberStart (Tokyo) Challenge 3
      • WiCYS CyberStart (Tokyo) Challenge 4
    • Chapter 3 - Barcelona In the thick of it
      • WiCYS CyberStart (Barcelona) Challenge 1
      • WiCYS CyberStart (Barcelona) Challenge 2
      • WiCYS Cyberstart (Barcelona) Challenge 3
      • WiCYS CyberStart (Barcelona) Challenge 4
  • 📕Technical Cyber articles
    • An in-depth analysis of an Intrusion Prevention System
    • DevSecOps-Making a difference from traditional DevOps
    • CVE - 2020–1472 (Zerologon Vulnerability)-Exploitation & Remediation
    • Computer Forensics Acquisition
    • Cyber Hygiene Tips
    • Hack your System - Linux Edition
    • Markovian Parallax Denigrate-Breaking the cipher
    • SIEM-Incorporating Incident Response into Network Security
    • Social Engineering-A leading cause for vulnerability occurrence
    • Report Writing in Digital & Multimedia Forensics
    • Zero-Day Vulnerabilities: A short overview
    • Zero Trust Network Access-A solution to Network Security
  • 🧑‍💻Hack The Box : Starting Point Machines
    • Meow
    • Fawn
    • Dancing
    • Redeemer
Powered by GitBook
On this page
  • Introduction to the Alert
  • Enumeration
  • Analysis of Evidence
  • Reconnaissance using Hybrid-Analysis
  • Reconnaisance using VirusTotal
  • Steps to solve and close this Ransomware alert
  • Alert Scorecard
  • Summary of the alert
  • Conclusion
  • Your opinion matters
  1. Let's Defend Blue Team Walkthroughs

SOC145 - Ransomware Detected Alert

Ransomware, you say? Let's have a look at it

PreviousSOC146  -  Phishing Mail Detected AlertNextSOC144  -  New scheduled task created Alert

Last updated 3 years ago

Welcome to this blog entry,as I document my journey,into the world of blue teaming.We will be tackling the “SOC145 — Ransomware Detected” case on the Let’s Defend platform,which is of hard difficulty

Let’s jump head first into it.

NOTE: Always remember to investigate alerts from Let's Defend, on a VM.

Introduction to the Alert

Alert particulars provided to the analyst:-

We first take a look at the mailbox, to find any pointers about the case —which we couldn't find

Enumeration

Now take the IP Address — 172.16.17.88 and perform a check on the endpoint and log sections

We get this from the Endpoint section, giving a description about the source IP Address’ host machine​

Endpoint Machine Name — MarkPRD

Windows 10 OS

User name — MarkGuna

Last Login — Aug 29 2020 08:12 PM

No entries were found for Browser, Network, or Command History. We get these entries for Process List, however:-

We get a corresponding match for someone named Mark, receiving a mail on Aug 29, when conducting a more thorough search in the LetsDefend mailbox​

Analysis of Evidence

Having performed initial enumeration, let's download the file and unzip it, using the passphrase: infected

We uncover a file named ab.bin.Running file command against it tells us that it is an executable file, with GUI Interface

Next, we take the file for analysis on VirusTotal and Hybrid-Analysis tools

Reconnaissance using Hybrid-Analysis

Hybrid Analysis — (File is classified as Ransomware)

Related Hash — d5e2584ff2c17966ac150adfaeaab508af50354c7611884d64207d9c5d6b969c​

File Analysis of the file on Hybrid-Analysis brings us:-

Reconnaisance using VirusTotal

VirusTotal — 60/68 vendors find the file suspicious

Threat Name — Avaddon (dark web intelligence)

MD5 Hash of malicious file — 0b486fe0503524cfe4726a4022fa6a68

Executed Shell commands and process tree of the suspected file

More notes about the ransomware file​

No relevant HTTP Traffic or DNS Requests for this file(checked on Hybrid Analysis).This is a big blow, as we don't know the origin (country) of the ransomware

IOC’s of infected file—Suspicious and Malicious

Steps to solve and close this Ransomware alert

Create a case

We select ‘Other threat indicator’ as classification for this file Malware quarratined or not? — No File is malicious or not? — Yes Check if any address accessed this malicious file? — Yes (we found IP- 81.169.145.105 had accessed this file,from the Log section)

Contain the machine — Yes

Now,we add artifacts to the case:-

IP Address 81.169.145.105 — Address that accessed the malicious file

IP Address 172.16.17.88 — Source address of ransomware

MD5 Hash 0b486fe0503524cfe4726a4022fa6a68 — Hash of file

Finish Playbook

Close the alert and state that it is a true positive

Alert Scorecard

15/20 points acquired! That’s not bad in my book!

Every alert solved is a step towards perfection and I am pretty happy with the score I received.

Summary of the alert

A SOC alert came in, detailing the case as Ransomware. Analyzing the file brought us to the conclusion that it was a binary file. Further enumeration found that the file was flagged previously on security and sandbox platforms, where we were able to gather more intelligence about the suspected file, concluding the alert to be a true positive

Conclusion

Thank you for reading this blog entry, and stay tuned as I try to close down more SOC alerts……

Your opinion matters

My audience has a voice. Feel free to reach out to me, on my socials (links are on top of this page) for any queries to be addressed. Dropping a sweet message would make my day

Let your opinion about this write-up be known, by selecting any one of the emojis below!

​

​

​

💽