2020-06-12 - Traffic Analysis Exercise Answers: Page 1 of 4
2020-06-12 - Traffic Analysis Exercise Answers: Page 1 of 4
ENVIRONMENT:
• LAN segment range: 10.06.12.0/24 (10.06.12.0 through 10.06.12.255)
• Domain: frank-n-ted.com
• Domain controller: 10.06.12.12 - Frank-n-Ted-DC
• LAN segment gateway: 10.06.12.1
• LAN segment broadcast address: 10.06.12.255
QUESTIONS:
Figure out what's going on.
ANSWERS:
What's going on? An infected Windows host, that's what!
First of all, there are two user accounts associated with two Windows clients:
IP address: 10.6.12.157
MAC address: 00:11:75:68:42:d3 (IntelCor_68:42:d3)
Host name: DESKTOP-86J4BX
User account name: ted.brokowski
IP IP address: 10.6.12.203
MAC address: 84:3a:4b:6d:fc:e2 (IntelCor_6d:fc:e2)
Host name: LAPTOP-5WKHX9YG
User account name: frank.brokowski
Page 1 of 4
2020-06-12 - TRAFFIC ANALYSIS EXERCISE ANSWERS
These computers are used by the infamous Frank and Ted Brokowski of
frank-n-ted.com. These two brothers would rather be watching a Youtube
video than figuring out what happened. But that's why you're here, right?
However, this URL was submitted to Any.Run, and you can find the analysis
here: https://app.any.run/tasks/0f0da931-b346-40b9-8485-1e2b4569a425.
In the analysis, that URL reutrns a Word document that generated a follow-up
HTTPS URL to https://immortalshield.com/read.php but return traffic from
immortalshield.com shows a 404 PAGE NOT FOUND. We have HTTPS
activity between 10.6.12.157 and immortalshield.com in our pcap.
Page 2 of 4
2020-06-12 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Follow the TCP stream for the HTTP GET request ending with june11.dll, and
you'll see a Windows DLL or EXE.
If you export this file from the pcap, you'll find it's detected by at least 19
vendors in VirusTotal as malware.
Less than two minutes after the HTTP requests to 205.185.125.104, several
HTTP POST requests from 10.6.12.203 go to snnmnkxdhflwgthqismb.com.
Page 3 of 4
2020-06-12 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Shown above: Use your basic web filter, then scroll down a bit to find the
ZLoader post-infection traffic.
Most of the time, ZLoader post-infection traffic is HTTPS, and it's much harder
to detect from a pcap. However, this ZLoader campaign currently uses
unencrypted HTTP for the post-infection activity. For more background on this
type of infection, see:
• https://isc.sans.edu/forums/diary/Job+applicationthemed+malspam+pus
hes+ZLoader/26222/
It makes me feel like saying, "Heeey yeaah yeaah yeaaaaaaaah!" Who's with
me?
Page 4 of 4