12.2.2.10 Lab PDF
12.2.2.10 Lab PDF
Objectives
Part 1: Prepare the Virtual Environment
Part 2: Analyze Pre-Captured Logs and Traffic Captures
Background / Scenario
Looking at logs is very important but it is also important to understand how network transactions happen at the
packet level.
In this lab, you will analyze the traffic in a previously captured pcap file and extract an executable from the file.
Required Resources
• CyberOps Workstation VM
• Internet connection
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 8 www.netacad.com
Lab – Extract an Executable from a PCAP
-rw-r--r-- 1 analyst analyst 371462 Jun 22 10:47 nimda.download.pcap
-rw-r--r-- 1 analyst analyst 3750153 May 25 11:10 wannacry_download_pcap.pcap
[analyst@secOps pcaps]$
b. Issue the command below to open the nimda.download.pcap file in Wireshark.
[analyst@secOps pcaps]$ wireshark-gtk nimda.download.pcap
c. The nimda.download.pcap file contains the packet capture related to the malware download performed
in a previous lab. The pcap contains all the packets sent and received while tcpdump was running.
Select the fourth packet in the capture and expand the Hypertext Transfer Protocol to display as shown
below.
d. Packets one through three are the TCP handshake. The fourth packet shows the request for the malware
file. Confirming what was already known, the request was done over HTTP, sent as a GET request.
e. Because HTTP runs over TCP, it is possible to use Wireshark’s Follow TCP Stream feature to rebuild
the TCP transaction. Select the first TCP packet in the capture, a SYN packet. Right-click it and choose
Follow TCP Stream.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 8 www.netacad.com
Lab – Extract an Executable from a PCAP
f. Wireshark displays another window containing the details for the entire selected TCP flow.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 8 www.netacad.com
Lab – Extract an Executable from a PCAP
What are all those symbols shown in the Follow TCP Stream window? Are they connection noise? Data?
Explain.
The symbols are the actual contents of the downloaded file, because its binary
file, Wireshark doesn’t know how to represent it. The displayed symbols are
Wireshark’s best guess at making sense of the binary data while decoding it as
text
There are a few readable words spread among the symbols. Why are they there?
Those are strings contained in the executable code. Usually these words are
part of messages provided by the program to the user while it runs
Challenge Question: Despite the W32.Nimda.Amm.exe name, this executable is not the famous worm.
For security reasons, this is another executable file that was renamed as W32.Nimda.Amm.exe. Using
the word fragments displayed by Wireshark’s Follow TCP Stream window, can you tell what executable
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 4 of 8 www.netacad.com
Lab – Extract an Executable from a PCAP
b. With the GET request packet selected, navigate to File > Export Objects > HTTP, from Wireshark’s
menu.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 5 of 8 www.netacad.com
Lab – Extract an Executable from a PCAP
c. Wireshark will display all HTTP objects present in the TCP flow that contains the GET request. In this
case, only the W32.Nimda.Amm.exe file is present in the capture. It will take a few seconds before the
file is displayed.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 6 of 8 www.netacad.com
Lab – Extract an Executable from a PCAP
Because the capture was started right before the download and stopped right
after. No other traffic was caught while the capture was active
d. In the HTTP object list window, select the W32.Nimda.Amm.exe file and click Save As at the bottom of
the screen.
e. Click the left arrow until you see the Home button. Click Home and then click the analyst folder (not the
analyst tab). Save the file there.
f. Return to your terminal window and ensure the file was saved. Change directory to the /home/analyst
folder and list the files in the folder using the ls -l command.
[analyst@secOps pcaps]$ cd /home/analyst
[analyst@secOps ~]$ ls –l
total 364 drwxr-xr-x 2 analyst analyst 4096 Sep 26 2014 Desktop
drwx------ 3 analyst analyst 4096 May 25 11:16 Downloads drwxr-
xr-x 2 analyst analyst 4096 May 22 08:39 extra drwxr-xr-x 8
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 7 of 8 www.netacad.com
Lab – Extract an Executable from a PCAP
analyst analyst 4096 Jun 22 11:38 lab.support.files drwxr-xr-x 2
analyst analyst 4096 Mar 3 15:56 second_drive
-rw-r--r-- 1 analyst analyst 345088 Jun 22 15:12 W32.Nimda.Amm.exe [analyst@secOps
~]$
The goal is to identify the type of malware and analyze its behavior.
Therefore, the malware file should be moved to a controlled environment and
execute it to watch its behavior. Malware analysis environments often rely on
virtual machines and are sandboxed to avoid damage to non-test systems.
Such environments usually contain tools that facilitate monitoring of the
malware execution; resources usage, network connections and operating
system changes are common monitored aspects
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 8 of 8 www.netacad.com