2015-02-08 - TRAFFIC ANALYSIS EXERCISE: FURTHER INVESTIGATION
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
PCAP AND MORE:
- 2015-02-08-traffic-analysis-exercise.pcap.zip 1.9 MB (1,937,094 bytes)
- 2015-02-08-traffic-analysis-exercise-email-the-user-received.eml.zip 13.3 kB (13,279 bytes)
SECOND DECISION POINT - YOU FINISH YOUR REPORT WITH INFORMATION FROM THE MALICIOUS EMAIL
First things first. You already looked at the pcap in Wireshark. Hopefully, you've set it up as I've described in my tutorial here. Use http.request for the filter and see what we've got:
A Google search on the domain names will indicate what's going on. You'll find a submission to malwr.com that shows the same network traffic (under the "Network Analysis" section). You'll also find a blog entry on TechHelpList.com discussing the same URLs from the pcap.
With that information, you might not need the EmergingThreats events generated by running the pcap through Snort or Security Onion:
INITIAL ASSESSMENT
An incident report of the activity should also include a technical details section after the short summary. It would have all URLs, domains, IP addresses, and other malicious traffic associated with the incident.
ADDITIONAL INFORMATION FROM THE MALICIOUS EMAIL
Here's the malicious email:
Shown above: The email attachment (a zip file).
Here's the malware from the email:
Shown above: The email attachment (a zip file).
Shown above: Extracted malware from the zip file.
You look up the information on VirusTotal and Malwr[.]com:
- VirusTotal report on the malicious zip file: link
- VirusTotal report on the extracted malware: link
- Malwr[.]com report on the extracted malware: link
Make sure you inlcude the email information and these file hashes in your report.
SECOND DECISION POINT - ALTERNATE CHOICE
You call Mike and confirm this was the email he used to infect his computer. You've alse confirmed the malware from the email was Upatre (TechHelpList confirms this in comments on the extracted malware from VirusTotal). You find the Dyreza malware on the forensic image from Mike's computer.
- Click here to finish your report with information from the Dyreza malware found on Mike's infected computer.
FINAL NOTES IF YOU CHOSE TO STOP HERE
- You figure you've got everything from an incident response perspective, and you're right. No need to do anything more, is there?
- Finishing the report at this point is not necessarily bad, especially if you've got other events to investigate. Spend too much time on one incident, and you might miss another infected computer.
Click here to return to the main page.