Incident Response Exercise 2: Analyzing a Malicious IP Alert
In this incident response exercise, we’re tasked with investigating a suspicious alert triggered by a connection to a potentially malicious IP address: 146.185.170.222. The investigation involves analyzing a PCAP file using Wireshark and utilizing Splunk for endpoint analysis to uncover the nature of the threat. Whether you’re learning incident response or exploring cybersecurity analysis, this breakdown aims to provide insight into the investigative process behind such alerts. đź§© Scenario OverviewThe alert originated from the SOC shift lead, who assigned the task of investigating an alert for a malicious IP address (146.185.170.222). The provided PCAP file contains the activity in question. Our objectives for this exercise are: 1: Confirming the PCAP Time Frame Using the capinfos tool, we verify the time frame of the PCAP file to ensure it aligns with the alert’s timestamp. This command provides metadata about the PCAP file, including the start and end times of the capture. 2: OSINT Research on IP Address 146.185.170.222 To better understand the nature of this IP, we performed open-source intelligence (OSINT) research using platforms like VirusTotal. Question 1. Is there published OSINT on the IP address? Yes Question 2. If so, what? The results were alarming — the IP has been associated with several high-profile malware families, including: These are well-known banking trojans and loaders often used in financially motivated cyberattacks and ransomware campaigns. Specifically, VirusTotal reported connections to: This strongly indicates that 146.185.170.222 is part of a known malicious infrastructure, and any communication with it should be treated as a serious threat. 3: Analyzing the PCAP with Wireshark Opening the PCAP file in Wireshark, we filter traffic related to the IP address: 146.185.170.222 Question 3. Was there a successful connection to the suspicious IP address? Yes Question 4. Was malware downloaded? Yes Question 5. If so, what is the name of the malicious file? Exfil.ps1 and Keylogger.ps1 What is the SHA256 Hashes of the files? Question 6. What does the malware do? Steals and exfils browser history, system information, and keylogger information’s. Question 7. Was there any information stolen? Yes Question 8. If so, how was information exfiltrated? FTP 4: Utilize Splunk for Endpoint Analysis Question 9. What was the file that caused the connection to the malicious IP address? Invoice.ps1 By pivoting off of evidence found in the PCAP — particularly a file named Exfil.ps1 — we crafted a simple SPL query in Splunk to trace back the activity: Question 10. What is the persistence mechanism for Exfil? Registry Run key. Using the same SPL as previously used, we can see Exfil.ps1 being written to the CurrentVersion\Run key. Question 11. What is the persistence mechanism for Keylogger? Registry Run Key. Question 12. How is data exfilled? Zipped and exfilled via FTP. We see the file being exfilled in the pcap. Pivoting from Exfil.zip discovered in the pcap, we see the file creation, with the following SPL: Additionally, we see the code for Exfil.ps1 from the pcap and see that it is writing the system info and the browser history to the directory \Windows\Temp\Exfil folder. Then we see it zipping the directory. Attack Overview: The downloader (Invoice.ps1) downloads two malicious PowerShell files, Exfil.ps1 and Keylogger.ps1. The Exfil file steals browser history, system information, and keylogger results and zips them up in a file and uses FTP to exfil the file. Keylogger installs a keylogger that writes the results to a .txt file. The downloader establishes persistence by writing to the Run key to start Keylogger.ps1 and Exfil.ps1 each time the user logs in to the system. The downloader PowerShell is shown below. The code for Exfil.ps1 is shown below.
Incident Response Exercise 2: Analyzing a Malicious IP Alert Read More »