Phishing Analysis-1
Phishing Analysis-1
There are 3 specific protocols involved to facilitate the outgoing and incoming email messages, and they are briefly listed
below.
• SMTP (Simple Mail Transfer Protocol) - It is utilized to handle the sending of emails. 465
• POP3 (Post Office Protocol) - Is responsible transferring email between a client and a mail server. 993
• IMAP (Internet Message Access Protocol) - Is responsible transferring email between a client and a mail 995
• server.
You should have noticed that both POP3 and IMAP have the same definition. But there are differences between the
two.
POP3
• Emails are downloaded and stored on a single device.
• Sent messages are stored on the single device from which the email was sent.
• Emails can only be accessed from the single device the emails were downloaded to.
• If you want to keep messages on the server, make sure the setting "Keep email on server" is enabled, or all
messages are deleted from the server once downloaded to the single device's app or software.
IMAP
• Emails are stored on the server and can be downloaded to multiple devices.
• Sent messages are stored on the server.
• Messages can be synced and accessed across multiple devices.
Now let's talk about how email travels from the sender to the recipient.
To best illustrate this, see the oversimplified image below:
Reminder: When dealing with hyperlinks and attachments, you need to be careful not to accidentally click on the
hyperlink or the attachment.
Hyperlinks and IP addresses should be 'defanged'. Defanging is a way of making the URL/domain or email address
unclickable to avoid accidental clicks, which may result in a serious security breach. It replaces special characters, like
"@" in the email or "." in the URL, with different characters. For example, a highly suspicious domain,
http://www.suspiciousdomain.com, will be changed to hxxp[://]www[.]suspiciousdomain[.]com before forwarding it to
the SOC team for detection.
TOOLS :
checklist of the pertinent information an analyst (you) is to collect from the email header:
• Sender email address
• Sender IP address
• Reverse lookup of the sender IP address
• Email subject line
• Recipient email address (this information might be in the CC/BCC field)
• Reply-to email address (if any)
• Date/time
• email body and attachment(s)
mailheader.org.
URLScan.io: https://urlscan.io/
Malware Sandbox :
Hybrid sandbox
Virustotal
Any.run
https://www.joesecurity.org/
Phishtool
• https://mxtoolbox.com/
• https://phishtank.com/?
• https://www.spamhaus.org/
Let's look at Twitter's SPF record using dmarcian's SPF Surveyor tool.
"DMARC, (Domain-based Message Authentication Reporting, & Conformance) an open source standard, uses a concept
called alignment to tie the result of two other open source standards, SPF (a published list of servers that are authorized
to send email on behalf of a domain) and DKIM (a tamper-evident domain seal associated with a piece of email), to the
content of an email. If not already deployed, putting a DMARC record into place for your domain will give you feedback
that will allow you to troubleshoot your SPF and DKIM configurations if needed."
Let's use the Domain Health Checker from dmarcian.com and check the DMARC status of microsoft.com.
Phishing IR Playbook:
• https://github.com/counteractive/incident-response-plan-template/blob/master/playbooks/playbook-
phishing.md
TOOLS :
- Email IOC Extractor github
Urlscan.io
Virustotal
SOC LvL.1 Page 10
Virustotal
Urlhaus.abuse.ch :
PhishTool :
Joesandbox :
Hybrid sandbox :
References:
https://gchq.github.io/CyberChef/
https://github.com/MalwareCube/Email-IOC-Extractor
https://phishtank.org/
https://www.url2png.com/
https://urlscan.io/
https://www.virustotal.com/gui/home/upload
https://www.urlvoid.com/
https://www.wannabrowser.net/
https://unshorten.it/
https://urlhaus.abuse.ch/
https://transparencyreport.google.com/safe-browsing/search
https://www.joesandbox.com/
Cisco talos
Virustotal
Process activity
Network connection
File activity
Oledump.py <file>
Oledump.py <file> -s <stream no. >
Oledump.py <file> -s <stream no. > -S
Oledump.py <file> -s <stream no. > --vbadecompresscorrupt
Phishtool
1. Containment :
- Determine scope
- Quarantine
- Block sender artifacts (exchange server )
▪ Microsoft exchange online
▪ Aws Workmail
- Block Web artifacts (EDRs)
- Block file artifacts
2. Eradication :
a. Remove malicious emails
i. Content search and eDiscovery
ii. Get-MessageTrackingLog -sender "sendermail" -MessageSubject "Hello"
SOC LvL.1 Page 12
ii. Get-MessageTrackingLog -sender "sendermail" -MessageSubject "Hello"
iii. Remove malicious files
iv. Abuse form submissions [email protected]
v. Credential changes
vi. Reimaging
3. Recovery :
a. Restore systems
4. Communication :
a. Notify affected users
b. Update stakeholders
5. User Education :
a. End User training
1. Email Filtering :
a. Email security services like
b. Marking external emails
3. Attachment Filtering :
a. File extension blocks
b. Attachment Sandboxing
5. User Training :
a. Security awareness Training
b. Phishing simulation Exercises
c. Reporting Function in mail services