Post

TryHackMe: Warzone 1 Write-up

TryHackMe: Warzone 1 Write-up

Introduction

Challenge Link: Warzone1

An alert triggered: Potentially Bad Traffic and Malware Command and Control Activity detected. Inspect the PCAP and retrieve the artifacts to confirm this alert is a true positive.

Tools:

  • Brim
  • Wireshark

Investigation Steps

Check the generated alerts using Brim.

1
event_type=="alert" | count() by alert.severity,alert.category, alert.signature | sort count

Alt

Find the source IP associated with the generated alerts

Alt

Examine the reputation of the IP in VirusTotal.

Alt

Upon checking the community tab, I found that the IP address is attributed to the threat group TA505. Check the downloaded malware family

1
event_type=="alert" | count() by src_ip, dest_ip, alert.category, alert.metadata.malware_family

Alt

Now inspect the web traffic for the flagged IP address

1
_path=="http" id.resp_h==169.239.128.11 |  count() by  id.orig_h, id.resp_h, method, user_agent 

Alt

REBOL is a “multi-paradigm dynamic programming language” that was designed to be used for network communications and distributed computing. According to this article, REBOL can be used to set up a command and control environment, which aligns perfectly with the triggered alert “Malware Command and Control Activity detected”.

Check the other web traffic.

1
_path=="http" |  count() by  id.orig_h, id.resp_h, method, user_agent

Alt

Upon checking the two IP addresses that use Windows Installer as a user-agent in VirusTotal, they were flagged as malicious.

1
185[.]10[.]68[.]235,192[.]36[.]27[.]92 

Check if there are any downloaded files from the Windows Installer user agent

1
_path=="files" 185.10.68.235 or 192.36.27.92 in tx_hosts | cut tx_hosts, rx_hosts, mime_type, filename, md5

Alt

check the MD5 hash in Virustotal; both were flagged as malicious files

1
filter.msi,10opd3r_load.msi

To inspect the contents of the files, select the row you want to inspect, then click on the Packets tab, this will open Wireshark and list all the packets associated with this packet.

Alt

Select any packet and follow the stream

Alt

An MSI file is a relational database; each table defines a different aspect of the installation process. At the end of the content, you will see instructions that the Windows Installer service uses to install, update, or remove an application.

The file, filter.msi was designed to install arab.exe and arab.bin under this directory: C:\ProgramData\001\ , it also creates a registry entries under Software\WixSharp\Used

Do the same with the second file.

1
_path=="files" 192.36.27.92 in tx_hosts

Alt

Alt

Alt

The second installer, 10opd3r_load.msi is used to fetch and set up the REBOL environment to execute a REBOL script named exemple.rb.

1
C:\ProgramData\Local\Google\rebol-view-278-3-1.exe,C:\ProgramData\Local\Google\exemple.rb

Conclusion

The analysis confirmed that the alert was a True Positive. We confirmed a multi-stage malware attack from the threat group TA505. The attack used malicious MSI files (filter.msi10opd3r_load.msi) to deploy a payload (arab.exe) and the REBOL framework to establish a stealthy command and control (C2) channel.

Check the next write-up for Warzone 2

This post is licensed under CC BY 4.0 by the author.