Malware Analysis Da-2-Compressed
Malware Analysis Da-2-Compressed
Digital Assignment - 2
1. Network Interface:
2. Capture Filter:
o Rationale: A broad capture without filters was used to ensure that all
types of network tra ic (including HTTP, DNS, TCP, and others) were
captured. This provides a more comprehensive dataset for analysis.
3. Capture Duration:
o Duration: 2+ hours.
o Visited Websites: Specific attention was given to capturing HTTP tra ic,
especially by visiting jayakumars.in and other HTTP sites with form
submissions.
5. Promiscuous Mode:
o Rationale: This setting ensures that all packets on the network, not just
those directed to the host, were captured. This provides a more complete
view of network activity.
6. Packet Length:
Calculation:
2. Calculate Duration:
1. Ethernet (0%):
o This shows that a significant amount of your network tra ic is using IPv6.
o UDP is a lightweight protocol often used for DNS, QUIC, and other fast,
connectionless services.
4. DHCPv6:
o A small number of packets (4) with 380 bytes. This protocol is used for
assigning IP addresses dynamically over IPv6.
5. IPv4:
o Packets: 1189.
o This is critical for almost all web tra ic as DNS translates domain names
to IPs.
1. Acknowledgment Number:
2. TCP Header:
o Header Length: 20 bytes (5) indicates the length of the TCP header.
PSH (Push): Indicates that the sender is pushing the data to the
receiving application.
o Window Size: 510 and the calculated window size of 130560 indicates
the amount of data that can be sent without waiting for an
acknowledgment.
o Timestamps: Often present for round-trip time calculations and can help
with performance analysis.
3. TCP Payload:
TLSv1.3 Record Layer: Specifies that this packet is part of the TLS
v1.3 protocol.
Content Type: Change Cipher Spec (20) indicates that this packet
is changing the cipher specifications, preparing to switch to a new
encryption method.
Version: TLS 1.2 (0x0303) suggests that TLS 1.2 is being used.
o Application Data:
This is the critical part where you see the actual encrypted
application data.
For each protocol, provide a brief explanation of its purpose and significance in a
network.
1. Ethernet
Purpose: Ethernet is a widely-used data link layer protocol that defines the
standards for network communication over wired networks.
Purpose: IPv6 is the most recent version of the Internet Protocol, designed to
replace IPv4.
Detect potential DNS tunneling or DDoS attacks by filtering for excessive DNS
requests:
ARP Spoofing:
Here are a few suspicious or noteworthy domain names and responses found in the
logs:
1. DNS Tunneling
Explanation: DNS tunneling involves encoding data into DNS queries, allowing
attackers to bypass network firewalls and exfiltrate data via DNS tra ic.
Indicators: The large number of DNS queries sent to the same destination in a
very short time frame (e.g., beacons.gcp.gvt2.com) could indicate DNS
tunneling.
Implement DNS Logging: Ensure that DNS queries are logged for future
analysis. Use tools that can capture and analyze DNS tra ic to detect anomalies,
such as high-frequency requests to the same domain.
Real-time Monitoring: Utilize network monitoring tools that can provide real-
time alerts for unusual DNS activity, such as unexpected spikes in tra ic or
queries to known malicious domains.
3. Network Segmentation
Deploy Endpoint Detection and Response (EDR): Utilize EDR solutions that
can detect and respond to suspicious activity on endpoints, including unusual
DNS queries.
Regularly Update and Patch Software: Ensure that all systems and
applications are regularly updated to mitigate vulnerabilities that could be
exploited by malware.
Conduct Training Sessions: Educate employees about the risks associated with
phishing and suspicious domains. Training can help users identify and report
unusual activity.
Encourage Reporting: Create a culture of awareness where users can easily
report suspicious activities without fear of repercussions.
Deploy Intrusion Prevention Systems (IPS): An IPS can detect and block
malicious tra ic patterns, including unusual DNS requests indicative of malware
or data exfiltration attempts.
Conduct Regular Drills: Perform regular incident response drills to ensure that
the team is prepared to respond to real threats e iciently.
Key Information from the Capture:
Key Observations:
GET Requests:
o Numerous GET requests are being sent to URLs under the path
/d/msdownload/update/others/. These seem to be related to Microsoft
update files, which end in .cab, .crl, etc.
o The requests are for downloading various files, possibly for updating
software like Microsoft O ice, as indicated by terms like O ice/Data.
Server Details:
Lack of Encryption: If any of the captured tra ic is over HTTP instead of HTTPS,
it could be intercepted, leading to a man-in-the-middle (MITM) attack.
o Packets: 1,160
o Packets: 1,732
o Percentage of Total Bandwidth: 7.0%
o Packets: 183
Source/Destination IPs:
The TCP packets are between di erent IPv6 addresses and the same
192.168.125.245.
TLSv1.2:
Multiple entries indicate that the tra ic includes TLS (Transport Layer Security)
packets, showing a secure communication channel is being used.
The client key exchange and encrypted handshake messages suggest the
establishment of a secure connection.
There are several entries indicating HTTP tra ic, specifically showing HEAD
requests being sent to the server and 200 OK responses, confirming successful
retrieval of resources.
TCP Flags:
Flags such as SYN, ACK, FIN, and retransmissions are present, indicating the
connection establishment and teardown process.
Timestamps:
The DNS queries are returning various A, AAAA, and CNAME records for di erent
Microsoft services, like:
download.windowsupdate.com
events.data.microsoft.com
edge.microsoft.com
o icecdn.microsoft.com
ecn.dev.virtualearth.net
These are typically part of Microsoft's update services, telemetry, and cloud
connections.
CNAME Records: These are alias records that point one domain name to
another domain name.
Key Points:
HTTP Methods: The most common methods observed are GET and HEAD.
Responses: Several HTTP responses indicate success (200 OK) and partial
content (206 Partial Content), which is typically used when a resource is too
large and is sent in chunks.
JSON Content: There are also requests that return JSON content, indicating
some API interactions.
Based on the observations of the HTTP tra ic in your provided data, where there are
repeated GET and HEAD requests and instances of partial content transfers, optimizing
network bandwidth could involve several strategies. Here’s a breakdown of potential
strategies:
1. Caching Mechanism:
Observation: The repeated GET and HEAD requests for similar resources (e.g.,
.cab files for O ice Data) suggest that some files might be downloaded multiple
times.
2. Content Compression:
Observation: Large data transfers are occurring with partial content responses
(206 Partial Content), indicating that files are likely being transferred in chunks.
o Ensure that the server supports compressed content, and the clients are
set to accept compressed responses.
Observation: Redundant requests for similar resources (same .cab files) from
the same source indicate ine iciencies in handling these resources.
Strategy: Implement proper resource validation using HTTP headers like If-None-
Match and Last-Modified so that servers return 304 Not Modified for unchanged
content. This ensures that clients do not download the same resources
unnecessarily, saving bandwidth.
Observation: Requests are being sent to various IPs, some of which could be
geographically distant from the client (52.140.67.125, 49.44.197.202).
o CDNs also help optimize bandwidth usage by o loading tra ic from the
origin server.
Observation: If multiple requests are being made from the same client to the
same server (e.g., between 192.168.125.245 and 103.53.14.4), each connection
establishment may be adding overhead.
Running Wireshark for an extended period of time provided several advantages, but also
introduced various challenges that needed to be managed e ectively.
Advantages:
2. Trend Analysis:
4. Historical Analysis:
o With extended capture, it was possible to look back at past tra ic events,
providing historical data that could be crucial in investigating incidents or
breaches that occurred hours or even days earlier.
Running Wireshark for a prolonged duration brought several challenges, both technical
and practical. Here’s a reflection on these challenges and the strategies employed to
overcome them:
2. Performance Impact:
3. Analysis Complexity:
o Solution: Using display filters and color rules in Wireshark made the
data easier to parse and helped narrow down relevant tra ic more
e iciently. Automated tools and scripts (e.g., Tshark) were also used to
extract relevant tra ic and identify suspicious patterns. Exporting the
capture to other network analysis tools (like Splunk) allowed for deeper
analysis.
6. Packet Loss:
7. Monitoring in Real-Time: