findthebad: model-3

This is log analysis/blue team focused lab. It is an introductory lab for doing log analysis with Kibana

https://github.com/findthebad/model-3

Prereqs:

sudo apt-get install docker
sudo apt-get install docker-compose

Setup:

git clone https://github.com/findthebad/model-3
cd model-3/
docker-compose up
  • Go to localhost:5601 to access the Kibana instance.

Lab questions:

  • What is the name of the malicious file that has executed?

  • What strain of malware does it appear to be?

  • What does this malware typically do?

  • When was this malware run and by which user on what computer? (Hint: Try pinning a Dashboard filter and viewing it in Discover)

  • What process wrote the malicious file to disk and when?

Starting the docker machine:

crazyeights@es-base:~/Desktop/model-3$ sudo docker-compose up

What is the name of the malicious file that has executed?

  • Go the localhost:5601

  • Open the sidebar and click Dashboards

  • Select the dashboard VT Hunting

Malicious file is: FAX_RECEIPT_SO_151-154.exe

  • it is the only file in the list of malicious exes that is not a built windows utility

  • (C:\Users\lab-admin\FAX_RECEIPT_SO_151-154.exe)

  • (aka GENERALOZD.exe)

What strain of malware does it appear to be?

  • Select the hash from the table

  • Open virus total, and search by hash:

6F9CE67A343B9F8BED90957132BE043C
  • Trojan - Agent Tesla

What does this malware typically do?

  • .NET based keylogger and RAT (Remote Access Trojan) readily available to actors. Logs keystrokes and the host’s clipboard and beacons this information back to the command and control

  • Trojan: malware disguised a legitmate software

  • Virus Total reports smtp traffic - sending info to adversaries via smtp.

  • Snippet of behavior, shows it opening files that might contain personal information (ie. cookies, passwords, ..)

When was this malware run and by which user on what computer? (Hint: Try pinning a Dashboard filter and viewing it in Discover)

  • Discover:

  • Saved my filter, went to discover and applied it again.

  • User: cb3f4b32-wsw10\lab-admin

  • Time: 2020-07-16 16:28:49.511

Process Create:
RuleName: -
UtcTime: 2020-07-16 16:28:49.511
ProcessGuid: {b0701843-8041-5f10-5701-000000000500}
ProcessId: 380
Image: C:\Users\lab-admin\FAX_RECEIPT_SO_151-154.exe
FileVersion: 1.1.1.1
Description: Lm5#_9Pqn{b0701843-8041-5f10-5701-000000000500}SQ4z$&w
Product: Lm5#_9Pqn{b0701843-8041-5f10-5701-000000000500}SQ4z$&w
Company: q)3B4aK#b%9YA
OriginalFileName: GENERALOZD.exe
CommandLine: "C:\Users\lab-admin\FAX_RECEIPT_SO_151-154.exe"
CurrentDirectory: C:\Users\lab-admin\
User: cb3f4b32-wsw10\lab-admin
LogonGuid: {b0701843-803e-5f10-4c57-110000000000}

Command used is:

"powershell.exe" -noninteractive -encodedcommand WwBDAG8AbgBzAG8AbABlAF0AOgA6AEkAbgBwAHUAdABFAG4AYwBvAGQAaQBuAGcAIAA9ACAATgBlAHcALQBPAGIAagBlAGMAdAAgAFQAZQB4AHQALgBVAFQARgA4AEUAbgBjAG8AZABpAG4AZwAgACQAZgBhAGwAcwBlADsAIABDADoAXABVAHMAZQByAHMAXABsAGEAYgAtAGEAZABtAGkAbgBcAEYAQQBYAF8AUgBFAEMARQBJAFAAVABfAFMATwBfADEANQAxAC0AMQA1ADQALgBlAHgAZQA=

which decodes to:

[.C.o.n.s.o.l.e.].:.:.I.n.p.u.t.E.n.c.o.d.i.n.g. .=. .N.e.w.-.O.b.j.e.c.t. .T.e.x.t...U.T.F.8.E.n.c.o.d.i.n.g. .$.f.a.l.s.e.;. .C.:.\.U.s.e.r.s.\.l.a.b.-.a.d.m.i.n.\.F.A.X._.R.E.C.E.I.P.T._.S.O._.1.5.1.-.1.5.4...e.x.e.

What process wrote the malicious file to disk and when?

  • Filter winlog.event_data.TargetFilename

  • Filter event.action to be: Process Create (rule: ProcessCreate)

  • Time: 2020-07-16 16:28:45.288

  • Process: Powershell

File created:
RuleName: EXE
UtcTime: 2020-07-16 16:28:45.288
ProcessGuid: {b0701843-803c-5f10-4901-000000000500}
ProcessId: 1272
Image: C:\windows\System32\WindowsPowerShell\v1.0\powershell.exe
TargetFilename: C:\Users\lab-admin\FAX_RECEIPT_SO_151-154.exe
CreationUtcTime: 2020-07-16 16:28:45.288

FIN.