IZBR

Hi! My name is Isaac Basque-Rice, I'm A Security Engineer and former Abertay Ethical Hacker, and this website is a repository for all the cool stuff I've done, enjoy!


Project maintained by IBRice101 Hosted on GitHub Pages — Theme by mattgraham

Basic Dynamic Analysis

Intro: Host and Network Indicators

Initial Detonation & Triage: Hunting for Network Indicators

A screenshot of the HTTP GET Request in Wireshark

Host-Based Indicators: Procmon

Part 1

Procmon showing that the file found in the Strings has been downloaded and dropped into a specific location

Part 2

Procmon showing the command issued if internet connection is not present

Dynamic Analysis of Unknown Binaries

Part 1: Analysing Wireshark

Analyst,

Excellent work with the last sample. Please take a look at the one in this directory. Our IR team said it might have command execution capabilities, but we’re not sure.

Please proceed directly with Basic Dynamic Analysis and determine:

  • Network signatures
  • Hist-based signatures
  • Command execution capabilities, if any
  • Any other findings

RE Team

Interesting strings extracted using FLOSS

Message Box Popup on initial detonation

GET Request the malware sends, as seen in Wireshark

Part 2: Host-Based Indicators

The file in the StartUp directory, as seen in procmon The file in the StartUp directory, as seen in the file explorer

Rat.Unknown.exe in TCP View shortly after being detonated

Command injection capable terminal encoded in base64

Analysing a Reverse Shell

Part 1: Correlating IOCs

Analyst! Excellent work with the previous samples. You are reallly coming along with your skillset. We found another sample on an endpoint that looks similar to the last one. Give it the triage treatment and let us know what you find RE Team

Part 2: Parent-Child Process Analysis