2024 08 15 Traffic Analysis Exercise Answers
2024 08 15 Traffic Analysis Exercise Answers
ENVIRONMENT:
LAN segment range: 10.8.15.0/24 (10.8.15.0 through
10.8.15.255)
Domain: lafontainebleu.org
AD environment name: LAFONTAINEBLEU
Domain Controller: 10.8.15.4 - WIN-JEGJIX7Q9RS
LAN segment gateway: 10.8.15.1
LAN segment broadcast address: 10.8.15.255
BACKGROUND:
A Windows host was infected, and it seems to be from
WarmCookie malware.
TASK:
Write an incident report based on traffic from the packet capture
(pcap) and the alerts. Extract any malware from the pcap and
provide files hashes in the report.
Page 1 of 10
2024-08-15 - TRAFFIC ANALYSIS EXERCISE ANSWERS
ANSWER (EXAMPLE OF AN INCIDENT REPORT):
Executive Summary:
On Thursday 2024-08-15 at approximately 00:11 UTC, a Windows
host used by Pierce Lucero was infected with WarmCookie
malware.
Victim Details:
Host name: DESKTOP-H8ALZBV
IP address: 10.8.15.133
MAC address: 00:1c:bf:03:54:82
Windows user account name: plucero
ZIP download:
104.21.55.70:80 – quote.checkfedexexp.com – GET /managements?
16553a25e45250a41fd5&endeds=MIGpq&JStx=59bf050d37df88a9-
ade43358-eaa1220b-0571422b-0f33e6aa150e86bafd0ed4&Ld=
9d7502d88d752a27b1d00587309184b5a215
DLL download:
http://72.5.43.29/data/0f60a3e7baecf2748b1c8183ed37d1e4
POST-infection traffic:
72.5.43.29:80 – 72.5.43.29 - POST /
72.5.43.29:80 – 72.5.43.29 - GET /
Page 2 of 10
2024-08-15 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Downloaded ZIP archive SHA256 hash:
798563fcf7600f7ef1a35996291a9dfb5f9902733404dd499e2e736ea1dc6fc5
File size: 2,767,804 bytes
File name: Invoice 876597035_003.zip
HINTS:
Of note, the common internal, non-routable IPv4 address for all of
the alerts is 10.8.15.133. To find further victim information, use the
Identifying Hosts and Users Wireshark tutorial.
For example, you can filter on nbns in Wireshark to quickly find the host
name of the infected Windows host at 10.8.15.133.
Page 3 of 10
2024-08-15 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Shown above: Finding the windows host name by filtering on NBNS traffic.
Shown above: Finding the windows user account name by filtering on Kerberos traffic.
ldap.AttributeDescription == "givenName"
Page 4 of 10
2024-08-15 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Shown above: Finding the victim’s first & last name in the pcap using above Wireshark filter for LDAP.
Shown above: Using Wireshark to export the zip archive and the DLL from the pcap.
Page 5 of 10
2024-08-15 - TRAFFIC ANALYSIS EXERCISE ANSWERS
The name of the zip archive is contained in the HTTP response
headers, which you can see by following the TCP stream or HTTP
stream of that particular HTTP GET request.
Shown above: Following the TCP stream for the HTTP GET request to quote.checkfedexexp.com.
Page 6 of 10
2024-08-15 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Shown above: Finding the zip archive file name in the TCP stream window.
Page 7 of 10
2024-08-15 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Shown above: Finding the HTTPS URL in the .js file that downloads further malicious content.
If we follow the TCP stream for the first HTTP GET request to
72.5.43.29, we can see indicators it returned an EXE or DLL file.
Shown above: Following the TCP stream for the GET request that returned the DLL.
Page 8 of 10
2024-08-15 - TRAFFIC ANALYSIS EXERCISE ANSWERS
Shown above: TCP stream showing an EXE or DLL file returned from 72.5.43.29.
To determine if this is an EXE or a DLL, you can use the file command
from a terminal window in macOS or a Linux distro.
Page 9 of 10
2024-08-15 - TRAFFIC ANALYSIS EXERCISE ANSWERS
The VirusTotal entry for this DLL indicates a crowd-sourced YARA rule
identifies this as WarmCookie. The Any.Run analysis of this file also
identifies it as WarmCookie.
Unfortunately, none of the alerts on the network traffic identify the traffic to
72.5.43.29 as WarmCookie, even though the alerts indicate it is malicious
or suspicious.
Page 10 of
10