2018-10-31 - Traffic Analysis

Read this in "about 3 minutes".

Description

Traffic analysis on 2018-10-31.

-> Link to the pcap: here.

-> Password: infected.

Credit: www.malware-traffic-analysis.net


Executive Summary

On 2018-10-31 15:34:11 UTC, Ichabod Crane’s computer was infected via opening and executing a Trickbot malware. After the incident was reported, the SOC team immediately contacted with Ichabod Crane to start investigating the incident.


Infection Overview

Date and time of the activity (in GMT or UTC)

  • 2018/10/31 15:34:11 PM

The account name or username from the infected Windows computer

  • ichabod.crane

The host name of the infected Windows computer

  • HEADLESS-PC

The MAC address of the infected Windows computer

  • HewlettP_2a:96:0a (00:50:8b:2a:96:0a)

SHA256 file hashes for any malware from the pcap

  • 396223eeec49493a52dd9d8ba5348a332bf064483a358db79d8bb8d22e6eb62c

What type of infection this is

  • Trickbot Malware


Traffic Analysis

Firstly, we’re recommended to inspect the Statistics section for a better vision over the traffic.

Within the Wireshark interface, we navigate to Statistics -> Protocol Hierarchy to inspect common traffic protocols.

20181031/1.png

As we can see, most communications took place under the TCP protocol.

Let’s also look at the “ipv4 addresses” statistic. To do so, we navigate to Statistics -> IP Addresses

20181031/2.png

Those highlighted ip addresses account for a large portion of traffic, which is prioritized as our target of investigation. The others are also worth to check out.

We’ll begin with http traffic as usual.

  • Search query: http.request
  • Then Follow TCP Stream of the packet 679.
20181031/3.png

We should see something similar to the follows:

20181031/4.png

The 10.100.9.107 address downloaded a Windows executable from an unknown source.

If we export the executable and submit it onto VirusTotal

20181031/5.png

The file is flagged as Trickbot malware by multiple vendors!.

Now, we can safely conclude that 10.100.9.107 is the victim of malware attack.

Additionally, we also discover various post-exploitation activities being done by attackers.

For instance, the communications with CnC for data exfiltration.

20181031/6.png

Inspecting one of the POST requests, we can see, i.e. system process is exfiltrated.

20181031/7.png

Others, attackers pivot and exploit the EternalBlue vulnerability on 10.100.9.4, demonstrated via TCP stream 69.

20181031/8.png

Security Onion is also a great way to start. In the below image, we can efficiently hunt for threats based on the alert rules from suricata or zeek.

20181031/9.png

Basically, above information is adequate to conclude that organization’s network is attacked, further actions needed to keep attackers away from critical infrastructures.