Summary:
This hands-on learning module focuses on using Splunk for security incident detection and response. Based on the Boss of the SOC challenge (Investigating APT), it allowed me to enhance my SIEM skills, cyber kill chain investigation, and OSINT techniques through repetition and the gradual learning of new concepts. Link to this challenge on TryHackMe
Scenario:
A Big corporate organization Wayne Enterprises has recently faced a cyber-attack where the attackers broke into their network, found their way to their web server, and have successfully defaced their website http://www.imreallynotbatman.com . Their website is now showing the trademark of the attackers with the message YOUR SITE HAS BEEN DEFACED as shown below.
Reconnaissance Phase
One Suricata alert highlighted the CVE value associated with the attack attempt. What is the CVE value?
The query returns 38 possible results, but 36 of them have CVE-2014-6271.
index=botsv1 sourcetype="suricata" src=40.80.148.42
dest="imreallynotbatman.com" CVE | stats count by signature
Answer: CVE-2014-6271
What is the CMS our web server is using?
We know DNS name and IP address of our web server, when look at incoming connections we can see used CMS in URL.
index=botsv1 sourcetype="suricata" src=40.80.148.42
dest="imreallynotbatman.com" OR dest="192.168.250.70"
Answer: Joomla
What is the web scanner, the attacker used to perform the scanning attempts?
Using the same broad query as above we can see http.http_user_agent
statistics and see that web application scanner Acunetix has been used several times.
Answer: Acunetix
What is the IP address of the server imreallynotbatman.com?
The answer can be easily found by looking after DNS imreallynobatman.com
and checking dest.ip
field.
Answer: 192.168.250.70
Exploitation Phase
What was the URI which got multiple brute force attempts?
Utilising the provided query we can see multiple attempts to authenticate via this URI.
index=botsv1 sourcetype=stream:http dest_ip="192.168.250.70" http_method=POST
form_data=*username*passwd* | rex field=form_data "passwd=(?<creds>\w+)"
|table
_time src_ip uri http_user_agent creds
Answer: /joomla/administrator/index.php
Against which username was the brute force attempt made?
The answer can be easily found by viewing events with the same query.
Answer: admin
What was the correct password for admin access to the content management system running imreallynotbatman.com?
Successful authentication keeps the connection alive. Also, status 200 maybe another sign.
index=botsv1 sourcetype="stream:http" dest_ip="192.168.250.70"
http_method=POST form_data=*username*passwd* dest_headers!="*Connection:
close*"
Answer: batman
How many unique passwords were attempted in the brute force attempt?
Adding dedup
command to the query removes duplicates and leaves only unique values.
Answer: 412
What IP address is likely attempting a brute force password attack against imreallynotbatman.com?
Answer: 23.22.63.114
After finding the correct password, which IP did the attacker use to log in to the admin panel?
Answer: 40.80.148.42
Installation Phase
Sysmon also collects the Hash value of the processes being created. What is the MD5 HASH of the program 3791.exe?
`index=botsv1 "3791.exe" EventCode=1 | table CommandLine, Hashes`
Answer: AAE3F5A29935E6ABCC2C2754D12A9AF0
Looking at the logs, which user executed the program 3791.exe on the server?
Answer: NT AUTHORITY\IUSR
Search hash on the virustotal. What other name is associated with this file 3791.exe?
Answer: ab.exe
Action on Objective
What is the name of the file that defaced the imreallynotbatman.com website?
Investigate URL
field to get the answer.
index=botsv1 src=192.168.250.70 sourcetype=suricata dest_ip=23.22.63.114
Answer: poisonivy-is-coming-for-you-batman.jpeg
Fortigate Firewall ‘fortigate_utm’ detected SQL attempt from the attacker’s IP 40.80.148.42. What is the name of the rule that was triggered during the SQL Injection attempt?
Investigate attack
field to find the answer.
index=botsv1 src_ip="40.80.148.42" sourcetype="fortigate_utm"
Answer: HTTP.URI.SQL.Injection
Command and Control
This attack used dynamic DNS to resolve to the malicious IP. What fully qualified domain name (FQDN) is associated with this attack?
Investigate HTTP
field to find the answer.
index=botsv1 dest_ip="192.168.250.70" "poisonivy-is-coming-for-you-batman.jpeg"
Answer: prankglassinebracket.jumpingcrab.com
Weaponization Phase
What IP address has P01s0n1vy tied to domains that are pre-staged to attack Wayne Enterprises?
Using source IP from the previous queries we can conduct additional research using Robtex, VirusTotal or Whois.domaintools to get more information on this IP.
Answer: 23.22.63.114
Based on the data gathered from this attack and common open-source intelligence sources for domain names, what is the email address that is most likely associated with the P01s0n1vy APT group?
First of all, I looked up domain name po1sonivy on VirusTotal
Then I used a hint and checked suspicious sibling web pages on otx.alienvault.com
Answer: lillian.rose@po1s0n1vy.com
Delivery Phase
What is the HASH of the Malware associated with the APT group?
Look up IP address 23.22.63.114
on ThreatMiner to analyse related to it files. One of them marked as a malicious one, investigate it using VirusTotal for confirmation.
Answer: c99131e0169171935c5ac32615ed6261
What is the name of the Malware associated with the Poison Ivy Infrastructure?
Answer: MirandaTateScreensaver.scr.exe