Splunk - Boss of the SOC

Forensic Oct 17, 2024

📜Scenario 1 / Web Site Defacement

Splunk Boss of the SOC

What is the likely IPv4 address of someone from the Po1s0n1vy group scanning imreallynotbatman.com for web application vulnerabilities?

imreallynotbatman.com
40.80.148.42

What company created the web vulnerability scanner used by Po1s0n1vy? Type the company name.

Acunetix

What content management system is imreallynotbatman.com likely using?

src_ip="192.168.250.70" | stats count by url
joomla

What is the name of the file that defaced the imreallynotbatman.com website? Please submit only the name of the file with extension?

src_ip="192.168.250.70" "http.http_content_type"="image/jpeg" | stats count by url
/poisonivy-is-coming-for-you-batman.jpeg

This attack used dynamic DNS to resolve to the malicious IP. What fully qualified domain name (FQDN) is associated with this attack?

src_ip="192.168.250.70" "http.http_content_type"="image/jpeg" | stats count by url
dest = prankglassinebracket.jumpingcrab.com

What IPv4 address has Po1s0n1vy tied to domains that are pre-staged to attack Wayne Enterprises?

src_ip="192.168.250.70" url=http://prankglassinebracket.jumpingcrab.com:1337:1337/poisonivy-is-coming-for-you-batman.jpeg
23.22.63.114

What IPv4 address is likely attempting a brute force password attack against imreallynotbatman.com?

dest_ip="192.168.250.70" imreallynotbatman.com http_method=POST|stats count BY src, form_data, status
 23.22.63.114

What is the name of the executable uploaded by Po1s0n1vy?

dest_ip="192.168.250.70" sourcetype="stream:http" POST *.exe
3791.exe

What is the MD5 hash of the executable uploaded?

3791.exe md5 source="WinEventLog:Microsoft-Windows-Sysmon/Operational" EventDescription="Process Create" app="C:\\inetpub\\wwwroot\\joomla\\3791.exe"
AAE3F5A29935E6ABCC2C2754D12A9AF0

GCPD reported that common TTPs (Tactics, Techniques, Procedures) for the Po1s0n1vy APT group, if initial compromise fails, is to send a spear phishing email with custom malware attached to their intended target. This malware is usually connected to Po1s0n1vys initial attack infrastructure. Using research techniques, provide the SHA256 hash of this malware.

VirusTotal

VirusTotal

9709473ab351387aab9e816eff3910b9f28a7a70202e250ed46dba8f820f34a8

What special hex code is associated with the customized malware discussed in question 111?

VirusTotal

53 74 65 76 65 20 42 72 61 6e 74 27 73 20 42 65 61 72 64 20 69 73 20 61 20 70 6f 77 65 72 66 75 6c 20 74 68 69 6e 67 2e 20 46 69 6e 64 20 74 68 69 73 20 6d 65 73 73 61 67 65 20 61 6e 64 20 61 73 6b 20 68 69 6d 20 74 6f 20 62 75 79 20 79 6f 75 20 61 20 62 65 65 72 21 21 21

What was the first brute force password used?

src="23.22.63.114" imreallynotbatman.com http_method=POST form_data=*username*passwd*| table form_data, _time, status| sort by _time
12345678

One of the passwords in the brute force attack is James Brodsky's favorite Coldplay song. We are looking for a six character word on this one. Which is it?

  1. A L I E N S
  2. Clocks
  3. Fix You
  4. Oceans
  5. Shiver
  6. Sparks
  7. Yellow
src="23.22.63.114" imreallynotbatman.com http_method=POST form_data=*username*passwd*yellow*| table form_data, _time, status| sort by _time
yellow

What was the correct password for admin access to the content management system running "imreallynotbatman.com"?

imreallynotbatman.com http_method=POST form_data="*username*passwd*" connection_type="Keep-Alive"
batman

What was the average password length used in the password brute forcing attempt?

src="23.22.63.114" imreallynotbatman.com http_method=POST form_data=*username*passwd*

| rex field="form_data" "passwd=(?<passwd>\w+)"

| eval passwd_len = len(passwd)

| stats avg(passwd_len) as avg_passwd_len

| eval avg_passwd_len = round(avg_passwd_len,3)
6.175

How many seconds elapsed between the time the brute force password scan identified the correct password and the compromised login?

imreallynotbatman.com http_method=POST form_data="*username*passwd*"

| rex field="form_data" "passwd=(?<passwd>\w+)"

| search passwd="batman"

| transaction passwd

| table duration
92.169084

How many unique passwords were attempted in the brute force attempt?

imreallynotbatman.com http_method=POST form_data="*username*passwd*"

| rex field="form_data" "passwd=(?<passwd>\w+)"

| stats dc(passwd) as "Total Unique Password"
412

📜Scenario 2 / Ransomware

What was the most likely IPv4 address of we8105desk on 24AUG2016?

host=we8105desk
192.168.250.100

Amongst the Suricata signatures that detected the Cerber malware, which one alerted the fewest number of times? Submit ONLY the signature ID value as the answer.

cerber host="suricata-ids.waynecorpinc.local"
2816763

What fully qualified domain name (FQDN) does the Cerber ransomware attempt to direct the user to at the end of its encryption phase?

source="stream:dns" src_ip="192.168.250.100"  query!="*.arpa" | stats  count by query
cerberhhyed5frqa.xmfir0.win

What was the first suspicious domain visited by we8105desk on 24AUG2016?

source="stream:dns" src_ip="192.168.250.100" NOT query IN ("*.arpa", "*.local", "*.microsft.com") AND query=*.* | table _time, query | sort _time
solidaritedeproximite.org

During the initial Cerber infection a VB script is run. The entire script from this execution, pre-pended by the name of the launching .exe, can be found in a field in Splunk. What is the length of the value of this field?

vbs app="C:\\Windows\\System32\\wscript.exe" | eval length=len(ParentCommandLine) | table length
4490

What is the name of the USB key inserted by Bob Smith?

sourcetype=WinRegistry friendlyname | stats count by registry_value_data
MIRANDA_PRI

Bob Smith's workstation (we8105desk) was connected to a file server during the ransomware outbreak. What is the IPv4 address of the file server?

src_ip="192.168.250.100" sourcetype="stream:smb" | stats count by path
192.168.250.20

How many distinct PDFs did the ransomware encrypt on the remote file server?

*.pdf dvc=”we9041srv.waynecorpinc.local” | stats dc(Relative_Target_Name)
257

The VBscript found in question 204 launches 121214.tmp. What is the ParentProcessId of this initial launch?

121214.tmp wscript
3968

The Cerber ransomware encrypts files located in Bob Smith's Windows profile. How many .txt files does it encrypt?

host=we8105desk sourcetype="XmlWinEventLog:Microsoft-Windows-Sysmon/Operational" TargetFilename="C:\\Users\\bob.smith.WAYNECORPINC\\*.txt" | stats dc(TargetFilename)
406

The malware downloads a file that contains the Cerber ransomware cryptor code. What is the name of that file?

src_ip="192.168.250.100" "solidaritedeproximite.org" http_method="GET"
/mhtr.jpg

Now that you know the name of the ransomware's encryptor file, what obfuscation technique does it likely use?

steganographie

Conclusion

In this task I have learnt how to:

  • Conduct search queries to find information in Splunk SIEM
  • Find IOCs linked to APT activity
  • Find marker of Ransomware activity
  • Conduct research to find malware information

I was able to finish the scenario in 3h17 that was a really good and intense exercice

Thanks for reading.

Happy learning!

Tags