October 2021 Contest: Forensic Challenge
Introduction
Today's diary is a forensic challenge for October 2021. The files are here. This month's challenge is based on a packet capture (pcap) of an Active Directory (AD) environment with three Windows clients that become infected. Each infection is based on an email, and the three emails that caused these infections are also provided. Your task? Match each email to its infected Windows client.
Participants who submit the correct answers will be entered into a drawing, and one lucky winner will receive a Raspberry Pi.
Rules for the contest follow:
- Only one submission per person.
- Participants who submit correct answers will be entered into a drawing, and one will win.
- Submissions should be made using the form on our contact page at: https://isc.sans.edu/contact.html
- Use
October 2021 Forensic Challenge
for the Subject: line. - Provide the following information:
- Match the email to the infected Windows host and user. Your answers should look something like:
- 2021-10-21-malicious-email-1102-UTC.eml - DESKTOP-PEQUOD - captain.ahab
- 2021-10-21-malicious-email-1739-UTC.eml - LAPTOP-NAUTILUS - captain.nemo
- 2021-10-21-malicious-email-2214-UTC.eml - DESKTOP-NCC1701 - james.kirk
- Match the email to the infected Windows host and user. Your answers should look something like:
- Potential winners should have a mailing address what we can easily ship the Raspberry Pi to.
Submissions will be accepted through Sunday October 31st, 2021. Everyone who submits the correct answers will be entered in a drawing, and the winner will be randomly chosen. The winner will be announced in an ISC diary on Thursday November 4th, and that diary will also provide analysis of the infection traffic.
Material for this month's forensic challenge is located here on malware-traffic-analysis.net. The page contains links to two zip archives. One zip archive contains a pcap of network traffic from AD environment. Another zip archive contains the three malicious emails.
NOTE: Be very careful, because this material has actual malware that could infect a WIndows computer. I always recommend people review pcaps and malicious emails in a non-Windows environment, if possible. If you don't know what you're doing, you should not participate in this contest. Instead, wait for analysis in our upcoming ISC diary with answers and analysis on Thursday November 4th.
Requirements
Analysis of the infection traffic requires Wireshark or some other pcap analysis tool. Wireshark is my tool of choice to review pcaps of infection traffic. However, default settings for Wireshark are not optimized for web-based malware traffic. That's why I encourage people to customize Wireshark after installing it. To help, I've written a series of tutorials. The ones most helpful for this quiz are:
- Wireshark Tutorial: Changing Your Column Display
- Wireshark Tutorial: Identifying Hosts and Users
- Wireshark Tutorial: Display Filter Expressions
- Using Wireshark - Exporting Objects from a Pcap
I always recommend reviewing the pcap and emails in a non-Windows environment like BSD, Linux, or macOS. Why? Because the material contains Windows-based malware. If you're using a Windows host to review the pcaps and emails, your antivirus (or Windows Defender) may delete or alter them. Worst case? You might accidentally run some of the malware and infect your Windows computer.
Final Words
Again, material for this month's contest is available here. As stated earlier, we will accpet submissions through Sunday October 31st, 2021. Everyone who submits the correct answers will be entered in a drawing, and the winner will be randomly chosen. The winner will be announced in an ISC diary on Thursday November 4th that will also provide analysis of the infection traffic.
---
Brad Duncan
brad [at] malware-traffic-analysis.net
Comments
Anonymous
Dec 3rd 2022
9 months ago
Anonymous
Dec 3rd 2022
9 months ago
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.
<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
Anonymous
Dec 26th 2022
9 months ago
Anonymous
Dec 26th 2022
9 months ago
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
Anonymous
Dec 26th 2022
9 months ago
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> nearest public toilet to me</a>
<a hreaf="https://defineprogramming.com/the-public-bathroom-near-me-find-nearest-public-toilet/"> public bathroom near me</a>
Anonymous
Dec 26th 2022
9 months ago
Anonymous
Dec 26th 2022
9 months ago
https://defineprogramming.com/
Dec 26th 2022
9 months ago
distribute malware. Even if the URL listed on the ad shows a legitimate website, subsequent ad traffic can easily lead to a fake page. Different types of malware are distributed in this manner. I've seen IcedID (Bokbot), Gozi/ISFB, and various information stealers distributed through fake software websites that were provided through Google ad traffic. I submitted malicious files from this example to VirusTotal and found a low rate of detection, with some files not showing as malware at all. Additionally, domains associated with this infection frequently change. That might make it hard to detect.
https://clickercounter.org/
https://defineprogramming.com/
Dec 26th 2022
9 months ago
rthrth
Jan 2nd 2023
8 months ago