Home (BTLO/Investigation) - Pretium
Post
Cancel
image alternative text

(BTLO/Investigation) - Pretium

The Security Operations Center at Defense Superior are monitoring a customer’s email gateway and network traffic (Crimeson LLC).

  • CTF is hosted on https://blueteamlabs.online/

    Scenario

    PCAP Analysis

    Export Objects (HTML)

    Let us open the LAB.pcap in Wireshark and let’s export HTML objects withExport Objects > HTML

We can see pdf.bat file that’s being downloaded, which apperas to be our initial payload file

What is the full filename of the initial payload file?: INVOICE_2021937.pdf.bat

This information can be found in the HTTP header. I’ve used this python’s module a lot, otherwise google would tell it is SimpleHTTPServer

What is the name of the module used to serve the malicious payload?: SimpleHTTPServer Analysing the traffic, what is the attacker’s IP address?: 192.168.1.9 Now that you know the payload name and the module used to deliver the malicious files, what is the URL that was embedded in the malicious email?: http://192.168.1.9:443/INVOICE_2021937.pdf.bat

Decoding in CyberChef

Follow the Packet as HTTP Stream

Find the PowerShell launcher string (you don’t need to include the base64 encoded script): powershell -noP -sta -w 1 -enc

To see what that obfuscated command is all about, let’s throw it into CyberChef

So i used Base64 + Regex. Copied that back into Input and apply Generic Code Beautify

What is the default user agent being used for communications? Mozila 5/0 You are seeing a lot of HTTP traffic. What is the name of a process where malware communicates with a central server asking for instructions at set time intervals?beaconing

Continuing with PCAP Analysis

Use either Find in Packet or use http Filter and scroll.

What is the URI containing ‘login’ that the victim machine is communicating to?: /login/process.php What is the name of the popular post-exploitation framework used for command-and-control communication?: Empire

Checking for exfiltration

So we know the Attacker’s IP. Lets filter that out and check Protocol Hierarchy Statistics

We can see that basically there’s only HTTP and ICMP where ICMP definately stands out. So let’s apply ICMP as filter

To check what’s being sent into requests (we are assuming exfiltration) we need to use TSHARK. So let’s use it and filter only Requests, outputing data tshark.exe -r C:\Users\BTLOTest\Desktop\Investigation\LAB.pcap -Y "icmp.type==8" -T fields -e data Since this outputs HEX, let’s put output into the file

1
C:\Program Files\Wireshark>tshark.exe -r C:\Users\BTLOTest\Desktop\Investigation\LAB.pcap -Y "icmp.t

Copy and paste that into CyberChef and apply. From Hex From Base64 and Regex

It is believed that data is being exfiltrated. Investigate and provide the decoded password: Y0uthinky0ucAnc4tchm3$$ What is the account’s username?: $sec-account

This post is licensed under CC BY 4.0 by the author.