Hero Image
XLM Macros (Document Analysis)

https://cyberdefenders.org/labs/55 Contents Description Helpful Tools Questions 1: Sample1: What is the document decryption password? 2. There is no question 2 . . . 3: Sample1: This document contains six hidden sheets. What are their names? Provide the value of the one starting with S. 4: Sample1: What URL is the malware using to download the next stage? 5: Sample1: What malware family was this document attempting to drop? 6: Sample2: This document has a very hidden sheet. What is the name of this sheet? 7: Sample2: This document uses reg.exe. What registry key is it checking? 8: Sample2: From the use of reg.exe, what value of the assessed key indicates a sandbox environment? 9: Sample2: This document performs several additional anti-analysis checks. What Excel 4 macro function does it use? 10: Sample2: This document checks for the name of the environment in which Excel is running. What value is it using to compare? 11: Sample2: What type of payload is downloaded? 12: Sample2: What URL does the malware download the payload from? 13: Sample2: What is the filename that the payload is saved as? 14: Sample2: How is the payload executed? For example, mshta.exe 15: Sample2: What was the malware family? Comments? Description Recently, we have seen a resurgence of Excel-based malicous office documents. Howerver, instead of using VBA-style macros, they are using older style Excel 4 macros. This changes our approach to analyzing these documents, requiring a slightly different set of tools. In this challenge, you’ll get hands-on with two documents that use Excel 4.0 macros to perform anti-analysis and download the next stage of the attack.

Hero Image
Hammered (Log Analysis)

https://cyberdefenders.org/labs/42 Contents Initial Analysis Initial Findings Manipulating the Logs auth.log - sorted by command then time auth.log - all unique lines sorted by command (excluding timestamp) auth.log - extract commands auth.log - extract IPs www-access.log - extract IPs www-access.log - extract user agents Questions #1 Which service did the attackers use to gain access to the system? #2 What is the operating system version of the targeted system? (one word) #3 What is the name of the compromised account #4 #5 Consider that each unique IP represents a different attacker. How many attackers were able to get access to the system? #6 Which attackers IP address successfully logged into the system the most number of times? #7 How many requests were sent to the Apache Server? #8 How many rules have been added to the firewall? #9 One of the downloaded files to the target system is a scanning tool. Provide the tool name. #10 When was the last login from the attacker with IP 219.150.161.20? #11 The database displayed two warning messages, provide the most important and dangerous one. #12 Multiple accounts were created on the target system. Which one was created on Apr 26 04:43:15? #13 Few attackers were using a proxy to run their scans. What is the corresponding user-agent used by this proxy? Failures Initial Analysis When we first unzip the archive, we get a large number of files. The challenge description says there are only five files (although apache2 is a folder containing three files, so seven in total); however, I found some answers are not in those seven files, so we need to consider all the files in the archive. However, most are in those primary five/seven.