Cover Image Background by BiZkettE1 on Freepik
Based on real-world occurrences and past analysis, this scenario presents a narrative with invented names, characters, and events.
Please note: The phishing kit used in this scenario was retrieved from a real-world phishing campaign. Hence, it is advised that interaction with the phishing artifacts be done only inside the attached VM, as it is an isolated environment.
As an IT department personnel of SwiftSpend Financial, one of your responsibilities is to support your fellow employees with their technical concerns. While everything seemed ordinary and mundane, this gradually changed when several employees from various departments started reporting an unusual email they had received. Unfortunately, some had already submitted their credentials and could no longer log in.
You now proceeded to investigate what is going on by:
- Analyzing the email samples provided by your colleagues.
- Analyzing the phishing URL(s) by browsing it using Firefox.
- Retrieving the phishing kit used by the adversary.
- Using CTI-related tooling to gather more information about the adversary.
- Analyzing the phishing kit to gather more information about the adversary.
Start the virtual machine in split-screen view by clicking the green Start Machine button on the upper right section of this task. If the VM is not visible, use the blue Show Split View button at the top-right of the page. Alternatively, using the credentials below, you can connect to the VM via RDP.
Note: The phishing emails to be analyzed are under the phish-emails directory on the Desktop. Usage of a web browser, text editor and some knowledge of the grep command will help.
The email samples are in the
.eml format which can be opened using Thunderbird.
The email titled Quote for Services Rendered processed on June 29 2020 100132 AM was sent to William McClean and contains an PDF attachment. The mail was sent from the email id Accounts.Payable@groupmarketingonline.icu
Who is the individual who received an email attachment containing a PDF?
What email address was used by the adversary to send the phishing emails?
The emails that were sent to the other employees are all identical. All of them also contain an HTML file as an attachment.
The HTML contains a link that points to
kennaroads.buzz. When the HTML file is opened with a web browser it leads to a page that looks like the Microsoft Login page.
Converting URL to Defanged Format
All the periods (.) that are present in the URL along with the
://symbol that is present after the protocol should be enclosed in square brackets. Then all the t’s that are present in the protocol name (HTTP/HTTPS) has to be replaced with the letter
What is the redirection URL to the phishing page for the individual Zoe Duncan? (defanged format)
On enumerating the URL the link to the malicious code can be found.
What is the URL to the .zip archive of the phishing kit? (defanged format)
To find the hash of the file use CyberChef which is pre-installed on the VM (present in the “tools” folder). Load the file into the input field and use the SHA2 function with a hash size set to 256.
What is the SHA256 hash of the phishing kit archive?
To find the time at which the phishing kit and domain were first flagged as malicious use VirusTotal. The site has to be opened on our local machine as the VM does not have internet access.
When was the phishing kit archive first submitted? (format: YYYY-MM-DD HH:MM:SS UTC)
2020-04-08 21:55:50 UTC
When was the phishing domain that was used to host the phishing kit archive first registered? (format: YYYY-MM-DD)
On further enumerating the domain used by the adversary a
log.txt file can be found that contains the details collected from the users who fell for the phishing attack.
What was the email address of the user who submitted their password twice?
To find the email ids used by the adversary the malicious package has to be downloaded.
By going through each file in the package the emails that are used can be found. Alternatively, using
grep and a simple regex condition all patterns in the code that look like an email id can be listed.
What was the email address used by the adversary to collect compromised credentials?
The adversary used other email addresses in the obtained phishing kit. What is the email address that ends in ”@gmail.com”?
Finding the flag in this room is a little tricky. But if we follow the hint word for word it can be found.
The hint mentions that the file with the flag is called flag and has the extension
.txt. On enumerating all the directories on the domain for a file called
flag.txt the flag will eventually get displayed.
The flag is in an encoded format. On using the Magic function in CyberChef the encoding is identified as Base64. The output appears to be in reverse. So to get the decoded flag the Magic function should be replaced with the Base64 function followed by the Reverse function.
What is the hidden flag?