Announcements:

06/09/2006 New IPv6 block has been assigned.

Search Site:

Local Weather
Welcome():
GMT/UTC Spokane
Borg On FOCUS():


Author Unknown
(Click Image)

The Internet Traffic Report monitors the flow of data around the world.   Internet Storm Center (ISC)
Infocon Status: SANS.edu Internet Storm Center
Threat Level: green Handler on Duty: Brad Duncan

SANS ISC: SANS.edu Internet Storm Center SANS.edu Internet Storm Center


Sign Up for Free!   Forgot Password?

Latest Diaries

December 2021 Forensic Challenge

Published: 2021-12-08
Last Updated: 2021-12-08 01:00:17 UTC
by Brad Duncan (Version: 1)
0 comment(s)

Introduction

Today's diary is a forensic challenge for December 2021.  This month's challenge is based on network traffic from an Active Directory (AD) environment where a Windows client becomes infected.  The prize for this contest is a Raspberry Pi. 

The packet capture (pcap) is in a password-protected zip archive available here

Rules for the contest follow:

  • Only one submission per person.
  • Participants who submit the correct answers will be entered into a drawing, and one will win the Raspberry Pi.
  • Submissions should be made using the form on our contact page at: https://isc.sans.edu/contact.html
  • Use December 2021 Forensic Challenge for the Subject: line.
  • Provide the following information:
    • IP address of the infected Windows computer.
    • Host name of the infected Windows computer.
    • User account names from the infected Windows computer.
    • Date and time the infection activity began in UTC (the GMT or Zulu timezone).
    • The family of malware that caused this infection.

We will accept submissions through Sunday December 19th, 2021.  Everyone who submits the correct answers will be entered in a drawing, and the winner will be randomly chosen.  The winner will be announced in an ISC diary on Wednesday December 22nd, and that diary will also provide analysis of the infection traffic.


Shown above:  Pcap for this monht's forensic challenge opened in Wireshark using the default column display.

Requirements

Analysis of the infection traffic requires Wireshark or some other pcap analysis tool.  Wireshark is my tool of choice to review pcaps of infection traffic.  However, default settings for Wireshark are not optimized for web-based malware traffic.  That's why I encourage people to customize Wireshark after installing it.  To help, I've written a series of tutorials.  The ones most helpful for this quiz are:

I always recommend participants review these pcaps in a non-Windows environment like BSD, Linux, or macOS.  Why?  Because this pcap contains Windows-based malware in some of the traffic.  If you're using a Windows host to review this pcap, your antivirus (or Windows Defender) may delete or alter the pcap.  Worst case?  If you extract malware from this pcap and accidentally run it, you might infect your Windows computer.

Active Directory (AD) Environment

The infected Windows host is part of an AD environment, so the pcap contains information about the Windows user account. The user account is formatted as firstname.lastname.  The AD environment characteristics are:

  • LAN segment range: 10.12.3.0/24 (10.12.3.0 through 10.12.3.255)
  • Domain: fargreentech.com
  • Domain Controller: 10.12.3.3 - FARGREENTECH-DC
  • LAN segment gateway: 10.12.3.1
  • LAN segment broadcast address: 10.12.3.255

Final Words

Again, the zip archive with a pcap of the infection traffic is available here.  The winner of today's contest and analysis of the infection traffic will be posted in an upcoming ISC diary two weeks from today on Wednesday December 22nd.

---

Brad Duncan
brad [at] malware-traffic-analysis.net

0 comment(s)

If you have more information or corrections regarding our diary, please share.

Recent Diaries

Webshells, Webshells everywhere!
Dec 7th 2021
1 day ago by Johannes (0 comments)

The Importance of Out-of-Band Networks
Dec 6th 2021
2 days ago by Xme (0 comments)

A Review of Year 2021
Dec 4th 2021
4 days ago by Guy (0 comments)

The UPX Packer Will Never Die!
Dec 3rd 2021
5 days ago by Xme (0 comments)

TA551 (Shathak) pushes IcedID (Bokbot)
Dec 3rd 2021
5 days ago by Brad (0 comments)

View All Diaries →

Latest Discussions

Dshield Sensor
created Jun 8th 2021
6 months ago by Rick (0 replies)

API port data
created Apr 25th 2021
7 months ago by JJ (1 reply)

RSS feed containing non-XML compatible characters
created Apr 14th 2021
7 months ago by Anonymous (1 reply)

Handler's Diary (Full text) RSS Feeds stopt working due to a typo
created Mar 5th 2021
9 months ago by bas.auer@auerplace.nl (0 replies)

port_scan issue in Snort3
created Feb 23rd 2021
9 months ago by astraea (0 replies)

View All Forums →

Latest News

Top Diaries

Shadow IT Makes People More Vulnerable to Phishing
Nov 10th 2021
4 weeks ago by Xme (0 comments)

"Summer of SAM": Microsoft Releases Guidance for CVE-2021-36934
Jul 22nd 2021
4 months ago by Johannes (0 comments)

Securing and Optimizing Networks: Using pfSense Traffic Shaper Limiters to Combat Bufferbloat
Jul 12th 2021
4 months ago by Johannes (0 comments)

DIY CD/DVD Destruction - Follow Up
Jul 4th 2021
5 months ago by DidierStevens (0 comments)

The Importance of Out-of-Band Networks
Dec 6th 2021
2 days ago by Xme (0 comments)


DShield (DSHIELD) website  

Return to Top

News(): [Valid RSS]
Friday June 09, 2006
New IPv6 block has been assigned.
[ Posted by:
sgrayban | Time: 03:59:10 AM ]
[ Category: Site News | Comments(disabled due to spamming) ]


This IPv6 block is now assigned by RIPE.

RIPE handle: SG4196-RIPE
Allocated range: 2a01:b0:10d9::/48

[ News Powered by Borgnet News ]

Return to Top

Copyright():
??? @ MEMBER OF PROJECT HONEY POT
Spam Harvester Protection Network
provided by Unspam
Creative Commons License
All content on this website (including text, photographs, audio files, and any other original works), unless otherwise noted, is licensed under a Creative Commons License.

Star Trek® is a registered trademark of Paramount Pictures.
No copyright infringement is intended and no profit is being made.

Website & Content
Copyright © 1997-2005 Scott Grayban
Legal Notice /\/\ Copyright Infringement /\/\ Privacy/TOS /\/\ Sitemap
Page last updated: Thursday July 09, 2020 - 05:30:36 PM PDT
$Id: index.shtml 241 2008-09-26 05:30:09Z sgrayban $