Log Analysis | Sysmon | Blue Team Labs Online

log-analysis-|-sysmon-|-blue-team-labs-online

Go to Blue team Labs online website and open the lab : Log Analysis – Sysmon
Download the file. We have to investigate the sysmon logs & answer some of the questions related to it.

1. What is the file that gave access to the attacker?
Inspect logs, see if you find any suspicious event, weird commands for this use the filter

source="sysmon-events.json" | stats count by Event.EventData.CommandLine 

You will find alot of suspicious commands, some of them trying to establish connection to C2 server, some downloading malcious file from internet, some executing malicious code using powershell in hidden window. you will see powershell.exe, supply.exe , but we have to find who started this process, for this use the filter.

source="sysmon-events.json"| stats count by Event.EventData.CommandLine Event.EventData.ProcessId Event.EventData.ParentProcessId

the very first command we found suspicious is powershell.exe which running a code in hidden window, the Parent process ID is 2848, which is associated to updater.hta, HTA files are essentially HTML files that are executed using the Microsoft HTML Application Host (mshta.exe). we can assume that updater.hta may have some malicious embedded hidden code in it which execute malicious command in powershell.
answer : updater.hta

2. What is the powershell cmdlet used to download the malware file and what is the port?
Use the same filter to find the command, you will see the powershell command the the cmdlet used.

powershell

answer: INvoke-WebRequest 6969

3. What is the name of the environment variable set by the attacker?
filter:

source="sysmon-events.json"| stats count by Event.EventData.CommandLine

variable set
answer: comspec=C:windowstempsupply.exe

4.What is the process used as a LOLBIN to execute malicious commands?
A LOLBIN (Living Off The Land Binary) refers to a legitimate, trusted executable or tool that is already present on the system. Attackers abuse these binaries to execute malicious commands or payloads, reducing the likelihood of detection by security software.
Common examples of LOLBINs include PowerShell, cmd.exe, ftp.exe, and wscript.exe, which are integral to the operating system.
In this case it could be powershell.exe or ftp.exe, because all malicious activity was started with powershell command it also downloads malicious file from internet like supply.exe, but in some instances of supply.exe the parent process is ftp.exe.
the correct answer according to the lab is ftp.exe

5. Malware executed multiple same commands at a time, what is the first command executed?
malicious command
answer: ipconfig

6. Looking at the dependency events around the malware, can you able to figure out the language, the malware is written.
filter:

`source="sysmon-events.json" | stats count by Event.EventData.TargetFilename Event.EventData.Image`

dependencies used by supply.exe
supply.exe targets 2 dynamic-linked libraries: Python27.dll & msvcr90.dll. Python27.dll indicating that the malware likely includes or relies on Python code. msvcr90.dll is microsoft visual C++ Runtime 9.0 library, It suggests that the Python interpreter or the malware itself was compiled or linked with Visual C++.
answer: python

7. Malware then downloads a new file, find out the full url of the file download.
filter: source="sysmon-events.json" | stats count by Event.EventData.CommandLine
file download powershell command
answer:

https://github.com/ohpe/juicypotato/releases/download/v0.1/JuicyPotato.exe

8. What is the port the attacker attempts to get reverse shell?
Reverse shell mean when attacker establishes a backdoor connection from the infected system to the attacker’s Command and Control (C2) server, enabling the attacker to execute commands on the infected machine and potentially exfiltrate sensitive information.

reverse shell command

supply.exe execute the command juicy.exe is likely a tool that exploits privilege escalation vulnerabilities, sets a local listner on port 9999. establish a connection to the attacker’s machine at IP 192.168.1.11, port 9898. question is asking for the destination port (attacker’s system port).
answer: 9898

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post
it’s-here:-the-new-moz-local-is-now-available

It’s here: The New Moz Local is Now Available

Next Post
from-fundamental-to-innovation-and-back-to-fundamental

From Fundamental To Innovation and Back to Fundamental

Related Posts
harmonyos-next中密码类数据保护场景解析

HarmonyOS Next中密码类数据保护场景解析

本文旨在深入探讨华为鸿蒙HarmonyOS Next系统(截止目前 API12)在开发多语言电商平台方面的技术细节,基于实际开发实践进行总结。主要作为技术分享与交流载体,难免错漏,欢迎各位同仁提出宝贵意见和问题,以便共同进步。本文为原创内容,任何形式的转载必须注明出处及原作者。 在当今数字化时代,密码类数据的保护对于应用的安全性和用户体验至关重要。无论是登录账号、进行金融交易还是访问敏感信息,密码都起着关键的作用。HarmonyOS Next作为一款先进的操作系统,其提供的Asset Store Kit为密码类数据的安全存储和管理提供了强大的解决方案。 (一)引言 密码类数据保护的重要性    – 在移动应用领域,密码类数据是用户身份验证的核心凭证。一旦密码泄露,用户的账号安全将受到严重威胁,可能导致个人信息被窃取、财产遭受损失等严重后果。例如,在金融类应用中,如果用户的登录密码被泄露,黑客可能会非法访问用户的账户,进行转账、消费等操作。因此,确保密码类数据的安全性是应用开发者必须首要考虑的问题。 Asset Store Kit的关键作用    – HarmonyOS…
Read More