Category: SOC - LetsDefend - Data Breach
Alert Phase
In this writeup, we will investigate the Mysterious Data Breach |
Answer This Questions
- Malicious file Name? (Easy)
- Which programming language is the backdoor written in? (Easy)
- Backdoor name? (Medium)
- Who is the author of backdoor? (Medium)
- What is command&control IP address? (Medium)
- Which user’s password leaked except Administrator user? (Medium)
- Which tool triggered the reverse shell? (Hard)
- What is the MD5 of backdoor? (Hard)
Detection Phase
- First we looking for anyone in company called
Anderson
by checking the Endpoint Security.
- After we check the
Endpoint Security
we found the device calledDesktop-Anderson
. -
Now we check and analyis all Processes, Network Action, Terminal History and Browser History in
Desktop-Anderson
. - Based on above information:
- Hostname: Desktop-Anderson
- IP Address: 172.16.17.54
- OS: Windows 10
- Primary User: Anderson
First Let’s Check Processes
Processes |
The path you’ve provided, C:/Users/Anderson/Desktop/services.exe
is a file system path on a Windows operating system. This path points to a specific executable file located on the desktop of the user account named Anderson
.
- services.exe: This is the specific executable file you’re referencing.
services.exe
is a critical system process in Windows that manages various system services. It’s an essential component of the Windows operating system.
However, it’s important to note that
services.exe
is also a commonly exploited filename used by malware. Legitimate “services.exe” is located in theC:/Windows/System32
directory. If you encounterservices.exe
in an unusual location like a user’s desktop, it could potentially indicate malware or suspicious activity.
Now lets go deep inside this process and see more information about this:
service.exe |
- Based on the provided strings, such as
Go build ID
and theGo-specific
syntax used in the string annotations, it appears that the fileservices.exe
is likely written in the Go programming language.
Then Let’s Check Network Action
Network Connections |
- The IP Address that anderson interact with:
- 🚩 172.16.17.49 (Malicious)
- 74.6.143.25
- 13.35.254.24
- 172.67.202.151
- 🚩 161.35.41.241 (Malicious)
- 172.67.202.151
Later we check the Log Management
to check this IPs Logs.
Then Let’s Check Terminal History
Terminal History |
It looks like you’ve provided a list of command-line commands along with timestamps. These commands are often used in the Windows Command Prompt to perform various system-related tasks.
- I’ll explain each command for you:
- ipconfig:
- This command is used to display the IP configuration settings of the computer, including information about network interfaces, IP addresses, subnet masks, and more.
- dir:
- The
dir
command is used to list the files and subdirectories in the current directory.
- The
- hostname:
- This command displays the name of the computer within a network.
- net user:
- The
net user
command is used to manage user accounts on the system. Without additional parameters, it typically displays a list of user accounts on the computer.
- The
- whoami:
- This command displays the username of the currently logged-in user.
- tasklist:
- The
tasklist
command displays a list of running processes and their associated information.
- The
- net user anderson:
- This command queries the user account information for the user named
anderson.
- This command queries the user account information for the user named
- ping 172.16.20.1:
- The
ping
command is used to test network connectivity to a specific IP address (in this case, 172.16.20.1). It sends a series of network packets to the specified IP address and measures the response time.
- The
- ipconfig:
Checking Log Management
🚩 Now we check the IP address 161.35.41.241:
Log Management |
From above logs, lets try to check logs:
This data encoded using Base64, lets try to decode this data by using cyberchef
cyberchef |
- Do above proccess for all above log and show secret data 😉
cyberchef |
cyberchef |
🚩 Checking the first log:
- Now we can take this content
aqlKZ7wjzg0iKM00E1WB/jq9_RA46w91EKl9A02Dv/nbNdZiLsB1ci8Ph0fb64/9Ks1YxAE86iz9A0dUiDl
and google it, and lets show the results
- Check this two links and use it for answering the hard questions.
Usefull links:
Artifacts
- IP Addresses
- 161.35.41.241
- 172.16.17.49
- Hashes
- f59095f0ab15f26a1ead7eed8cdb4902
Flags
1. Malicious file Name? (Easy)
services.exe2. Which programming language is the backdoor written in? (Easy)
Go programming language3. Backdoor name? (Medium)
HTTP.GORAT4. Who is the author of backdoor? (Medium)
FireEye5. What is command&control IP address? (Medium)
161.35.41.2416. Which user’s password leaked except Administrator user? (Medium)
- Anderson:ander12son!- Administrator:mys3r3tP@ss!
7. Which tool triggered the reverse shell? (Hard)
impacket8. What is the MD5 of backdoor? (Hard)
f59095f0ab15f26a1ead7eed8cdb4902Protect Your Digital Presence & Stay Cyber Safe 💙
Thanks🌸