Skip to content

simple writeup let's defend SOC 145 Ransomware Detected. Monitoring, Log Management, Case Management, Endpoint Security.

Notifications You must be signed in to change notification settings

Abdibimantara/Writeup-Lets-Defend-SOC-145--Ransomware-Detected

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 

Repository files navigation

Writeup Lets Defend SOC 145 - Ransomware Detected

Simple Writeup let's defend SOC 145 Ransomware Detected. Monitoring, Log Management, Case Management, Endpoint Security.

Source link

https://app.letsdefend.io/

Third party tools

Details Alert

On May 23, 2021, at 7.32 Pm, the SOC lets Defend team found an alert that appears on the Monitoring menu. The result of the event description contains a notification of an attempt to spread ransomware on a client environment. The event was detected with id 92 and source ip 172.16.17.88. It is known that the user is the master "MarkPRD". According to the information we got, the file indicated as ransomware is ab.exe with the hash value shown in the image below. Don't forget, the reason we focus on analyzing the event is the "high" severity value.

image

The First Stage

After knowing the details of the event, we enter into the analysis process. Starting with the stage of gathering detailed information.

image

We started collecting information through "Log Management" and "Endpoint Security". More detailed information about "Log Management" & "Endpoint Security" can be read at the following link

Log Management Result

Click the "Log Management" menu, we search by keyword source ip 172.16.17.88. The search results show 2 communication traffic on that ip. where the destination ip consists of 81.169.145.105 & 192.64.119.190. This indicates that the host can still communicate with other users. image

Endpoint Security Result

Continuing the process of gathering information, we enter the "Endpoint Security" menu. The SOC team uses the same keyword, namely 172.16.17.88. Through the "Endpoint Security" menu, we get detailed information such as Hostname, IP Address, OS version, Client/Server and Device Status. Based on the results of the check, we conclude that the malware is not Quarantined .

image

The Second Stage

Through the information that was obtained, the SOC Team concluded that the device indicated by the malware was not in quarantine. so we have to do the analysis immediately so as not to cause problems.

image

Analysis with ANYRUN

anyrun is one of the many third-party SOC tools that are useful in helping analyze malware. The concept of these tools is a sandbox, so the analysis is based on dynamic analysis. image

when we tried to run the ab.bin file which we successfully downloaded. We get information as shown in the image below:

image image image

The ab.bin file will run the process behind the scenes. Through the anyrun dashboard, we found as many as 247 file modifications. After we check in more detail. There are lots of delete system backup commands.

Analysis with Virus Totals

VirusTotal is an Alphabet product that analyzes file, URL, domain and IP address searches to detect malware and other types of threats, and automatically shares them with the security community.

To view the VirusTotal report, you need to send the attached file, IP address, or domain to VirusTotal.

we try to do a report search on the online data. this search is based on the hash value we already know.

image

it can be seen that in the total virus, the hash is indicated to have a bad reputation. of 59/69. other than that the data we got was updated since 5 days ago.

the information we get from virus totals is almost the same as anyrun. where the ab.bin file runs the delete process behind the scenes

image

Analysis with Malwoverview

Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Malware Bazaar, ThreatFox, Triage and it is able to scan Android devices against VT.

using malwoverview, we tried to find more detailed information about the ab.bin file. we use api from triage. information comes from triage, there are several reports that can be seen in the picture. image

The ab.bin.zip file is indicated as avaddon malware. where the malware belongs to the ransomware family. This is evidenced by a valid signature.

image

Analysis with Hybrid Analysis

Hybrid analyst is a sandbox malware tool just like anyrun.

To strengthen the results of our analysis, that the ab.bin file is malware. once again we tried to dynamically analyze the file using another sandbox malware platform. image

image

image

the results we get through the hybrid analysis tools really strengthen the analysis. where we the information consists of:

  1. Antivurus detects above 76% that the ab.bin file is malware
  2. The ab.bin file is indicated as ransomware
  3. This file has been tested on os version 32 and 64 bit
  4. Incident response generated by the file is also very dangerous.

and don't forget we also found important notes left by the attacker, namely the website that must be visited avaddonbotrxmuyl.onion

image

The third stage

The SOC team is required to carry out threat hunting, whether there are other devices or users related to the IP of the device indicated as avaddon malware.

image

Go back to the "log management" menu, it appears that the IP has communicated with 2 other IP devices. so we do a "request host contained" process to prevent any other communication.

image

from the results of the previous analysis we found several indicators of compromise, namely: Source ip : 172.16.17.88 hash : 0b486fe0503524cfe4726a4022fa6a68 Website : avaddonbotrxmuyl.onion

After confirming that the ab.bin file is malware, the SOC Team needs to provide a record for the event.

image

The fourth stage

After the event analysis has been successfully carried out and the results are obtained. So the event will be closed by the SOC Team by providing a description of the results of the analysis and small notes.

image

Reference

About

simple writeup let's defend SOC 145 Ransomware Detected. Monitoring, Log Management, Case Management, Endpoint Security.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published