Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: SANS Internet Storm Center SANS Internet Storm Center


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

October 2021 Contest: Forensic Challenge

Published: 2021-10-22
Last Updated: 2021-10-22 22:17:47 UTC
by Brad Duncan (Version: 1)
0 comment(s)

Introduction

Today's diary is a forensic challenge for October 2021.  The files are here.  This month's challenge is based on a packet capture (pcap) of an Active Directory (AD) environment with three Windows clients that become infected.  Each infection is based on an email, and the three emails that caused these infections are also provided.  Your task?  Match each email to its infected Windows client.

Participants who submit the correct answers will be entered into a drawing, and one lucky winner will receive a Raspberry Pi.

Rules for the contest follow:

  • Only one submission per person.
  • Participants who submit correct answers will be entered into a drawing, and one will win.
  • Submissions should be made using the form on our contact page at: https://isc.sans.edu/contact.html
  • Use October 2021 Forensic Challenge for the Subject: line.
  • Provide the following information:
    • Match the email to the infected Windows host and user.  Your answers should look something like:
      • 2021-10-21-malicious-email-1102-UTC.eml - DESKTOP-PEQUOD - captain.ahab
      • 2021-10-21-malicious-email-1739-UTC.eml - LAPTOP-NAUTILUS - captain.nemo
      • 2021-10-21-malicious-email-2214-UTC.eml - DESKTOP-NCC1701 - james.kirk
  • Potential winners should have a mailing address what we can easily ship the Raspberry Pi to.

Submissions will be accepted through Sunday October 31st, 2021.  Everyone who submits the correct answers will be entered in a drawing, and the winner will be randomly chosen.  The winner will be announced in an ISC diary on Thursday November 4th, and that diary will also provide analysis of the infection traffic.

Material for this month's forensic challenge is located here on malware-traffic-analysis.net.  The page contains links to two zip archives.  One zip archive contains a pcap of network traffic from AD environment.  Another zip archive contains the three malicious emails.

NOTE: Be very careful, because this material has actual malware that could infect a WIndows computer.  I always recommend people review pcaps and malicious emails in a non-Windows environment, if possible.  If you don't know what you're doing, you should not participate in this contest.  Instead, wait for analysis in our upcoming ISC diary with answers and analysis on Thursday November 4th.

Requirements

Analysis of the infection traffic requires Wireshark or some other pcap analysis tool.  Wireshark is my tool of choice to review pcaps of infection traffic.  However, default settings for Wireshark are not optimized for web-based malware traffic.  That's why I encourage people to customize Wireshark after installing it.  To help, I've written a series of tutorials.  The ones most helpful for this quiz are:

I always recommend reviewing the pcap and emails in a non-Windows environment like BSD, Linux, or macOS.  Why?  Because the material contains Windows-based malware.  If you're using a Windows host to review the pcaps and emails, your antivirus (or Windows Defender) may delete or alter them.  Worst case?  You might accidentally run some of the malware and infect your Windows computer.

Final Words

Again, material for this month's contest is available here.  As stated earlier, we will accpet submissions through Sunday October 31st, 2021.  Everyone who submits the correct answers will be entered in a drawing, and the winner will be randomly chosen.  The winner will be announced in an ISC diary on Thursday November 4th that will also provide analysis of the infection traffic.

---

Brad Duncan
brad [at] malware-traffic-analysis.net

0 comment(s)

If you have more information or corrections regarding our diary, please share.

Recent Diaries

"Stolen Images Evidence" campaign pushes Sliver-based malware
Oct 21st 2021
2 days ago by Brad (0 comments)

Thanks to COVID-19, New Types of Documents are Lost in The Wild
Oct 20th 2021
2 days ago by Xme (0 comments)

Can you make the Great Chinese Firewall work for you?
Oct 19th 2021
3 days ago by Johannes (0 comments)

Malicious PowerShell Using Client Certificate Authentication
Oct 18th 2021
4 days ago by Xme (0 comments)

Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013
Oct 16th 2021
6 days ago by Guy (0 comments)

View All Diaries →

Latest Discussions

Dshield Sensor
created Jun 8th 2021
4 months ago by Rick (0 replies)

API port data
created Apr 25th 2021
5 months ago by JJ (1 reply)

RSS feed containing non-XML compatible characters
created Apr 14th 2021
6 months ago by Anonymous (1 reply)

Handler's Diary (Full text) RSS Feeds stopt working due to a typo
created Mar 5th 2021
7 months ago by bas.auer@auerplace.nl (0 replies)

port_scan issue in Snort3
created Feb 23rd 2021
7 months ago by astraea (0 replies)

View All Forums →

Latest News

Top Diaries

"Summer of SAM": Microsoft Releases Guidance for CVE-2021-36934
Jul 22nd 2021
3 months ago by Johannes (0 comments)

Securing and Optimizing Networks: Using pfSense Traffic Shaper Limiters to Combat Bufferbloat
Jul 12th 2021
3 months ago by Johannes (0 comments)

DIY CD/DVD Destruction - Follow Up
Jul 4th 2021
3 months ago by DidierStevens (0 comments)

Maldocs: Protection Passwords
Feb 28th 2021
7 months ago by DidierStevens (0 comments)

Malicious PowerShell Using Client Certificate Authentication
Oct 18th 2021
4 days ago by Xme (0 comments)