
BlueSky Ransomware Blue Team Lab
Network Forensics lab
1-To detect the IP Which That Responsible for the port scanning i used the same Criteria which is open the Requests HTTP tab and easily detect it the first IP made a lot of requests and all of it seems suspicious always makes your eyes see quickly what happen to easily and smoothly predict what should you do in the next move


2-To determine the account targeted username the easiest way is to open network miner and discover the Credentials is The tab in network miner which is show us directly which account is targeted "defend smarter not harder"


3- To detect the password i use the same way for the username


4- To identify which the setting the attacker changes i open Network Miner parameters section and there is a RECONFIGURE parameter and the bellow query show the changes was happen which is the "xp_cmdshell"


5-To detect the process injection i check the event viewer and start to open every event and read the details until i found the Host-name=MSFConsole it is our lover metasploit so detect the Host Application Which is the one of the devils in our story


5-To get The file that the attacker attempt to download i add the attacker ip as filter + request method get



6-To understand which SID the script checked i think it`s a perfect time to understand what is the script is do


8-To determine the registry keys used i go to the Function StopAV in the script and determine the keys


9-The Second Download URL is firstly appear in CleanerETC function


10-After Analysis the script everything will be easy in the function CleanerETC we can determine that the precestince task


11- The Second script is del.ps1 and i determine it with two ways the same filter in wireshark and networkminer after analysis this script the most important thing from my view is Stop-Process Command which is directly Defend_Evasion according to Mitre


12-From the first question when i check the connection the Invoked script light up my eyes btw


13- When i was looking for the dumbed password name i tricked by this damn file but after look for the next script it is here LOL



14- Now it is the time of this tricky file BTW

15-To Know the Dropped ransomware file name i used virus total after upload the hash of the malware on it


16- And the Family name is also VirusTotal


Last updated