siunam's Website

My personal website

Home Writeups Blog Projects About E-Portfolio

Warzone 2 | Dec 2, 2022

Introduction

Welcome to my another writeup! In this TryHackMe Warzone 2 room, you’ll learn: Inspecting network traffics via Brim and more! Without further ado, let’s dive in.

Background

You received another IDS/IPS alert. Time to triage the alert to determine if its a true positive.


You work as a Tier 1 Security Analyst L1 for a Managed Security Service Provider (MSSP). Again, you’re tasked with monitoring network alerts.

An alert triggered: Misc activity, A Network Trojan Was Detected, and Potential Corporate Privacy Violation.

The case was assigned to you. Inspect the PCAP and retrieve the artifacts to confirm this alert is a true positive.

Your tools:

Task 1 - Another day, another alert.

Question 1 - What was the alert signature for A Network Trojan was Detected?

In here, we can use Brim to inspect the PCAP file:

Now, we can query a filter to extract the alert signature:

event_type=="alert" | count() by alert.category,alert.signature

Question 2 - What was the alert signature for Potential Corporate Privacy Violation?

Question 3 - What was the IP to trigger either alert? Enter your answer in a defanged format.

In here, we can just filter the event_type to alert:

event_type=="alert"

Question 4 - Provide the full URI for the malicious downloaded file. In your answer, defang the URI.

Armed with the attacker IP address, we can use that as the filter query:

_path=="http" | id.resp_h==185.118.164.8

Question 5 - What is the name of the payload within the cab file?

Now, we can find the hash value of that file. To do so, I’ll use the File Activity query filter:

Then, copy and paste it to VirusTotal:

In the Details session, we can view the details of this malware:

Question 6 - What is the user-agent associated with this network traffic?

Again, we can use the HTTP request filter query, and only find the user_agent column:

_path=="http" | id.resp_h==185.118.164.8 | cut user_agent

Question 7 - What other domains do you see in the network traffic that are labelled as malicious by VirusTotal? Enter the domains defanged and in alphabetical order. (format: domain[.]zzz,domain[.]zzz)

While I was finding alert signatures in question 1 and 2, I found a category called Misc activity:

Let’s find anythings that’s related to Misc activity!

Hmm… Let’s filter HTTP requests that’s matched with that source IP address!

_path=="http" id.resp_h==176.119.156.128 | cut host,uri

Hmm… Those 2 domains looks sussy.

Question 8 - There are IP addresses flagged as Not Suspicious Traffic. What are the IP addresses? Enter your answer in numerical order and defanged. (format: IPADDR,IPADDR)

In Brim, there is a query filter called Suricata Alerts by Source and Destination:

Question 9 - For the first IP address flagged as Not Suspicious Traffic. According to VirusTotal, there are several domains associated with this one IP address that was flagged as malicious. What were the domains you spotted in the network traffic associated with this IP address? Enter your answer in a defanged format. Enter your answer in alphabetical order, in a defanged format. format: (domain[.]zzz,domain[.]zzz,etc)

Now, we can use the first IP address as the filter:

_path=="dns" 64.225.65.166 | cut query | uniq

Found 3 unique DNS queries.

Question 10 - Now for the second IP marked as Not Suspicious Traffic. What was the domain you spotted in the network traffic associated with this IP address? Enter your answer in a defanged format. (format: domain[.]zzz)

Same as the previous question, we can use the second IP address as the filter:

_path=="dns" 142.93.211.176 | cut query

Conclusion

What we’ve learned:

  1. Inspecting Network Traffics via Brim
  2. Monitoring Network Alerts
  3. Searching Malware/IP Details via VirusTotal