misp-training/exercises/spearphishing-exercise-2/exercise.md

99 lines
4.4 KiB
Markdown

---
tags: MISP, misp-training, training, exercise, hands-on
---
# MISP Encoding Exercise : Infection via spear-phishing email
## Ressources
- [Cheatsheet: Concepts & Data model](https://www.misp-project.org/misp-training/cheatsheet.pdf)
- [Attributes Categories and Types](https://iglocska.eu/pages/display/doc/categories_and_types)
- [MISP Objects](https://www.misp-project.org/objects.html) and [searchable in MISP](https://iglocska.eu/taxonomies/index)
- [Galaxies](https://www.misp-project.org/galaxy.html) and [searchable in MISP](https://iglocska.eu/galaxies/index)
- [Taxonomies](https://www.misp-project.org/taxonomies.html) and [searchable in MISP](https://iglocska.eu/taxonomies/index)
## Chronology
- **11:42:43 UTC+0**: Email containing a malware sent from supposedly Andrew Ryan
- **11:47:27 UTC+0**: Email was read, its attachment opened and executed
- **11:47:28 UTC+0**: Malware added persistence
- **12:08:18 UTC+0**: Malware successfully contacted the C2 to get its configuration
## Type of data extracted from evidences
- Original **e-mail**
- The actual malware **binary**
- **Registry Keys** for persistence and configuration
- C&C server **ip address** used to generate the malware's configuration
- The **bitcoin address** on which the ransom should be paid
- The **person**, impersonated (or fake) that sent the email
## Data extracted from evidences
- Spear-phishing `email`
> Subject: Invoice 4829-2383
>From: "Andrew_Ryan" <Andrew_Ryan@rindustries.rp>
>To: "Brigid_Tenenbaum" <Brigid_Tenenbaum@rindustries.rp>
>
>Dear Brigid,
>
>Please see the attached Iolta report for 4829-2383.
>
>We received a check request in the amount of $1,637.28 for the above referenced file. Would you kindly take care of this request at your earliest convenience.
>
>Thanks.
>
>Andrew_Ryan
>CEO
>
>Ryan Industries
>42, Central Control Hephaestus - Rapture
>www.rindustries.rp
>
>*Not licensed to practise law.
>
>This communication contains information that is intended only for the recipient named and may be privileged, confidential, subject to the attorney-client privilege, and/or exempt from disclosure under applicable law. If you are not the intended recipient or agent responsible for delivering this communication to the intended recipient, you are hereby notified that you have received this communication in error, and that any review, disclosure, dissemination, distribution, use, or copying of this communication is STRICTLY PROHIBITED. If you have received this communication in error, please notify us immediately by telephone at 1-800-766-7751 or 1-972-643-6600 and destroy the material in its entirety, whether in electronic or hard copy format.
- `cryptolocker.exe`
- Malware attached to the mail
- [cryptolocker.exe (no auth)](https://iglocska.eu/malicious.exe)
- `81.177.170.166`
- `ip address` of a C2 server used to generate the configuration
- `HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "CryptoLocker"`
- The registry key used for persistence
- `HKCU\SOFTWARE\CryptoLocker VersionInfo`
- The registry key containing the configuration received from the C2 server
- `0x819C33AE`
- XOR key used to encode the configuration data
- Person, e-mail, occupation and role
- `Andrew Ryan`, `Andrew_Ryan@rindustries.rp`
- `CEO`, `Victim`, `Originator`
## Encoding tasks
These are the steps you are asked to do. The order is provided as a suggestion.
1. Create an new *event*
2. Encode all data to be shared
- **Indicators**
- Supportive data / Observable
- Non technical indicators
3. Add relationships to recreate the events and story
4. Add the time component to recreate the chronology
5. Perform enrichments where applicable (e.g location if IP address)
6. Add contextualization
- **Incident type**
- `circl`, `enisa`, `europol-incident`
- **Releasability** and **Permissible Actions**
- `tlp`, `PAP`
- **Malware type / familly**
- `malware_classification`, `ransomware`
- Infection vector
- `ransomware`, `maec-delivery-vectors`, `europol-event`
- **Adversary infrastructure**
- `adversary`
- **Adversary tactics and techniques**
- `attack-pattern` Galaxy
- Malware-specific information
- `ransomware`, `maec-malware-capabilities`
- Mitigations and Detection
- `Course of Action`
- Collaboration and sharing
- `workflow`, `collaborative-intelligence`
7. Create a small write-up as an *event report*
8. Review the distribution level and publish