LetsDefend - Email Analysis

Created: 23/02/2024 11:00 Last Updated: 05/06/2024 20:52


3a700eec6de3390ca5ff31dbcc67dbe3.png

You recently received an email from someone trying to impersonate a company, your job is to analyze the email to see if it is suspicious.

Email Link: Download C:\Users\LetsDefend\Desktop\Files\BusinessEmail.zip Password: infected

Attachment: Download C:\Users\LetsDefend\Desktop\Files\unitedscientificequipent.zip Password: infected

This challenge prepared by ZaadoOfc


Start Investigation

After downloaded both file, I started by parsing the eml file on Email Viewer and opened it on vscode at the same time

17abf6d9ed26b2bfb3570d67e7c63d11.png

a1d8c7d632e781e8590bd5a4ad52fa20.png

Online Email Reader works as a charm, this is what it should look like

55076133c368cf5884b0b0a9460fba24.png

Looking at the header it seems like the sender was not hide the actual email

Looking at the contents it says that there is an attachment came with it and the sender told the recipient to confirm it

36d75b63ef17b9ce9ab28a2cd3c23ffd.png

Since the sender IP address could be seen on the email header, I searched this IP for the location and this IP address located in the Vancouver from Canada.

Now it's time to analyze the email attachment

5ae2689681a19fa10575d120fe26a7db.png

Just at first gland, it's obviously a hugh red flag right there, it's not an image file or document file but an exe file

8e0810c2b30bffcf6c84a9d8485b83b8.png

11b34a6e6e6b627c86e52b9e80163a58.png

I threw it to pestudio and found that this file does 3 MITRE techniques

57ab04d852fb2675eee7b8e36449704e.png

Then I searched the hash on VirusTotal, Sure enough that this file is malicious and these vendors labels it as Loki

So our investigation concluded here


What is the sending email address?

yanting@united.com.sg

What is the email address of the recipient?

admin@malware-traffic-analysis.net

What is the subject line of the email?

united scientific equipment

What date was the Email sent? Date format: MM/DD/YYYY

02/08/2021

What is the originating IP?

71.19.248.52

What country is the ip address from?

Canada

What is the name of the attachment when you unzip it? (with extension)

united scientific equipent.exe

What is the sha256 hash of the File?

9909753BFB0AC8AB165BAB3555233D03B01A9274A92E57C022F87CCBE51CA415

Is the email attachment malicious? Yes/No

Yes

Summary

The phishing email was sent to admin which the sender was from Canada and doesn't hide the actual mail, but the attachment that shipped with it is a malicious PE file labeled as LOKI, the infamous info-stealer some various also act as a ransomware

f2173ce633562072c6459a91e2cd3d0a.png