← Back to Index

TryHackMe - Phishing Analysis Tools (Phishing Case 1-3)

77bebe6bbc08d4557788a76f4a5645cd.png


Table of Contents


Phishing Case 1

Scenario: You are a Level 1 SOC Analyst. Several suspicious emails have been forwarded to you from other coworkers. You must obtain details from each email for your team to implement the appropriate rules to prevent colleagues from receiving additional spam/phishing emails.

Task: Use the tools discussed throughout this room (or use your own resources) to help you analyze each email header and email body.

What brand was this email tailored to impersonate?

979f7612632d36cfa367f04ebcc6604b.png

We will have to start the attackbox on this one and we can see that there is an email that we have to investigate on the Desktop and we have Wireshark and CyberChef on the Tools folder.

66855b8b39e7d94da9770fd17bbf1215.png

We can double click eml file which will automatically started Thunderbird and display an email like this, we can see that the attacker was trying to imitate Netflix to get user to click a link embedded on that red button by manipulate an emotion such as panick or afraid to lose the account.

Netflix

What is the From email address?

918b65ed3cf21bd249cadca0eef6fa97.png

We have quite long email sender and look we do not have to look at the source of this email to answer this question and we can easily copy this sender email by clicking on it and select "Copy Email Address". one thing to notice here is the sender email is very suspicious and its less likely that the actual netflix will send an email without the @netflix.com domain.

JGQ47wazXe1xYVBrkeDg-JOg7ODDQwWdR@JOg7ODDQwWdR-yVkCaBkTNp.gogolecloud.com

What is the originating IP? Defang the IP address.

c68b3abf677343ffaf9f4e8880df5caf.png

Its time to dig into the source by clicking the "More" button at top right and select "View Source".

adbdcf9514e43013dad6f666e4574754.png

Now we can see that the X-Originating-Ip header is the header that stores the actual sender IP of this email.

209[.]85[.]167[.]226

From what you can gather, what do you think will be a domain of interest? Defang the domain.

ca326975f11e6e29a244f070dd77984a.png

Then we can see that Return-Path header and SPF header has specific domain that is not associated with netflix at all and this is likely to be the actual email that was sent by the phisher.

etekno[.]xyz

What is the shortened URL? Defang the URL.

30ec0044b27fb146791998677db37047.png

There are so many HTML code on the source so we can come back to rendered email, right click on the red button and copy the location/url

1c6ad1d13ca1a2d9e42747174cb13651.png

Now we paste it in CyberChef to defang and now we get the answer.

hxxps[://]t[.]co/yuxfZm8KPg?amp=1

Phishing Case 2

Scenario: You are a Level 1 SOC Analyst. Several suspicious emails have been forwarded to you from other coworkers. You must obtain details from each email for your team to implement the appropriate rules to prevent colleagues from receiving additional spam/phishing emails.

A malicious attachment from a phishing email inspected in the previous Phishing Room was uploaded to Any Run for analysis.

Task: Investigate the analysis and answer the questions below.

Link: https://app.any.run/tasks/8bfd4c58-ec0d-4371-bfeb-52a334b69f59

What does AnyRun classify this email as?

56f6c2be2685897bfbd088566f726028.png

Alright first thing we noticed after opened any.run report is the filename and classification that was marked by any.run itself which is Suspicious Activity.

Suspicious Activity

What is the name of the PDF file?

Payment-updateid.pdf

What is the SHA 256 hash for the PDF file?

b457d3321c4194b2922951bcfe0bedc1.png

First way we can get file hashes is by clicking the filename right here.

cb3ec8f3f38f88e3436825ec0c87e4c8.png

Which will display another window that we can look up the result on VirusTotal, look at the metadata of the file and also 4 different types of hash including the fuzzing hash (SSDEEP)

cc6f1a04b10bcb168aeec8d870b97bd7c20fc161e8310b5bce1af8ed420e2c24

What two IP addresses are classified as malicious? Defang the IP addresses. (answer: IPADDR,IPADDR)

7f363dd9c032992a8250de4c3317942a.png

aba1e26b51c86aad956671d79a9c096e.png

I could not find any IP address flagged as malicious on any.run interactive report so I opened the text report which we can see that on the "Connections" section there are 2 IP addresses belong to Akamai that flagged as Malicious on this report.

b9daf23975318ef904dd2ad92842c935.png

Defang it real quick to get the answer.

2[.]16[.]107[.]24,2[.]16[.]107[.]49

What Windows process was flagged as Potentially Bad Traffic?

3cebaa45ec8cb393e7ed758dfe2e5f2d.png

We can go back to interactive report to find the which process was flagged as Potentially Bad Traffic from the "Threats" section right there.

svchost.exe

Phishing Case 3

Scenario: You are a Level 1 SOC Analyst. Several suspicious emails have been forwarded to you from other coworkers. You must obtain details from each email for your team to implement the appropriate rules to prevent colleagues from receiving additional spam/phishing emails.

A malicious attachment from a phishing email inspected in the previous Phishing Room was uploaded to Any Run for analysis.

Task: Investigate the analysis and answer the questions below.

Link: https://app.any.run/tasks/82d8adc9-38a0-4f0e-a160-48a5e09a6e83

What is this analysis classified as?

cbb79e6c8dd86cb9f7d0959108ac8f47.png

Upon opening this report, I noticed several things from the classification as Malicious, file type that indicate that this is the malicious document (maldoc) and the "EQNEDT32.EXE" process that spawned under "EXCEL.EXE" which likely indicates CVE-2017-11882

5c59bd6b8fe0fb3303990c2dc84ae92e.png

And It really is!, this is well-known vulnerable to get remote code execution on the vulnerable Microsoft Office application.

Malicious activity

What is the name of the Excel file?

CBJ200620039539.xlsx

What is the SHA 256 hash for the file?

8f1ec79202807927c5ec603e161fc780.png

We can also get file hash from the Text report as well

5F94A66E0CE78D17AFC2DD27FC17B44B3FFC13AC5F42D3AD6A5DCFB36715F3EB

What domains are listed as malicious? Defang the URLs & submit answers in alphabetical order. (answer: URL1,URL2,URL3)

c940f2f1b02c56348980d935548b67e9.png

On the text report, we can see that 3 different domain/url were contacted and all of them are flagged as malicious.

e2a50614918b7a0e9c1db4cacd6aff43.png

Defang them with CyberChef and we can copy this to answer the question and we will do the same for the next question as well.

biz9holdings[.]com,findresults[.]site,ww38[.]findresults[.]site

What IP addresses are listed as malicious? Defang the IP addresses & submit answers from lowest to highest. (answer: IP1,IP2,IP3)

75[.]2[.]11[.]242,103[.]224[.]182[.]251,204[.]11[.]56[.]48

What vulnerability does this malicious attachment attempt to exploit?

c9899cf3c7da0cffa19ba75cfdd09b94.png

We already know that this file aims to exploit CVE-2017-11882.

fc45fb58198de3dc858c2f02623873de.png

Which is the Buffer Overflow RCE on Microsoft Equation Editor of Microsoft Office which will serve as an initial point of compromised upon opening the file just like malicious macro but this time it has no macro, just buffer overflow code - https://unit42.paloaltonetworks.com/unit42-analysis-of-cve-2017-11882-exploit-in-the-wild/

CVE-2017-11882

af0423e22f535f707bbb13a011510511.png