Home Challenge 27 - Executable Excavation
Post
Cancel

Challenge 27 - Executable Excavation

Description

Challenge #T0278

Executable Excavation

Author: Bailey Kasin

Framework Category: Protect and Defend

Specialty Area: Incident Response

Work Role: Cyber Defense Incident Responder

Task Description: Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. (T0278)

Scenario

Shawn O’Keefe had a strange executable that was found on his workstation. It has been isolated on Security Desktop, but we want you take a look at it to see if you can determine what it was doing.

Additional Information

More details and objectives about this challenge will be introduced during the challenge meeting, which will start once you begin deploying the challenge.

You will be able to check your progress during this challenge using the check panel within the workspace once the challenge is deployed. The checks within the check panel report on the state of some or all of the required tasks within the challenge.

Once you have completed the requested tasks, you will need to document the methodology you used with as much detail and professionalism as necessary. This should be done on the documentation tab within the workspace once the challenge is deployed. Below the main documentation section be sure to include a tagged list of applications you used to complete the challenge.

Your username/password to access all virtual machines and services within the workspace will be the following…

Username: playerone

Password: password123

The username/password used to access the Firewall’s web interface within the workspace will be the following…

Username: admin

Password: password123

Network Map

Network Map

Meeting

Meeting

NICE Framework & CAE KU Mapping

NICE Framework KSA

K0001. Knowledge of computer networking concepts and protocols, and network security methodologies.

K0002. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

K0004. Knowledge of cybersecurity and privacy principles.

K0005. Knowledge of cyber threats and vulnerabilities.

K0041. Knowledge of incident categories, incident responses, and timelines for responses.

K0042. Knowledge of incident response and handling methodologies.

K0070. Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

K0161. Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).

K0162. Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).

K0179. Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

K0259. Knowledge of malware analysis concepts and methodologies.

K0287. Knowledge of an organization’s information classification program and procedures for information compromise.

S0003. Skill of identifying, capturing, containing, and reporting malware.

S0078. Skill in recognizing and categorizing types of vulnerabilities and associated attacks.

S0080. Skill in performing damage assessments.

CAE Knowledge Units

Basic Cyber Operations

Basic Networking

Basic Scripting and Programming

Cyber Crime

Cybersecurity Foundations

Cyber Threats

Digital Forensics

Security Risk Analysis

Software Reverse Engineering

Software Security Analysis

Payload.exe Analysis

String

strings01 strings02 strings03

Cat

cat01 cat02 cat03 cat04 cat05

JoeSandBox

Sample Submission URL: https://www.joesandbox.com/analysis/801376

IP & Port: 172.31.2.89:56

joesandbox

.NET Reflector disassembler

URL: https://www.red-gate.com/products/reflector/

I downloaded the free version of .NET Reflector and loaded the payload.exe. Browsed the code and identified the time frame, IP, and port.

Timeframe: 7 minutes

Destination IP: 172.31.2.89

Destination Port: Hex: 0x38, Dec: 56

reflector01 reflector02

Summary

Tools:

1
2
Linux: strings, cat01
Windows: WinSCP, .NET Reflector

Machines used:

1
2
Workstation
Security-Desk

Used strings to look at any text in the file. Used cat to output the file to the screen. I was able to identify the IP 172.31.2.89.

I then turned to the Windows workstation and transferred the payload.exe using WinSCP. Download .NET Reflector a .NET decompiler. I opened the payload.exe in .NET Refelector and took a look at the source code. Found that the application runs for 7 minutes. Found the function that launches the connection connects to 172.31.2.89 on port 0x38. Converted the hex of the port 0x38 to decimal 56. I filled in the form at 172.16.30.100 with the information from the decompiled payload.exe.

Submitted:

1
2
3
4
5
Title: Submission #1
Activity Type: reverseshell
Mallicious IP Address: 172.31.2.89
Malicious Port: 56
Interval Payload Ran On: 7

The payload.exe looks to create a reverse shell and connect to the destination IP. It is then used as a command and control to exfiltrate data from the machine.

ir submission

This post is licensed under CC BY 4.0 by the author.