SOC104 — Malware Detected Alert: A Walkthrough

Hello, blue teamers. It’s the first week of sunny March and that means one thing, doing all of Let’s Defend’s 5 monthly challenges. These are a set of real-world SOC Alerts, where you are tasked to review, analyze and mitigate the threat(if any). Today I will be guiding you through SOC104 — Malware Detected alert

NOTE: Always remember to investigate alerts from Let’s Defend, on a VM.

Alert details

These are the background details of the alert. Have a good read, as this information comes in handy later

Proceed to take ownership of the alert

Create case

Start the playbook

Now, let’s delve into the questions

Define Threat Indicator

Select Threat Indicator

As of now, we cannot determine the indicator. To pinpoint the cause, let’s proceed to download the .zip attachment, provided with the alert

Upon unzipping the zip file, we find a .exe named winrar600

To see how this works, let’s have it run on Anyrun and VirusTotal

Analysis with Anyrun

Running the .exe file on a VM, we are met with this WinRAR installation screen

Analysis with VirusTotal

The green circle is welcome news of the analyzed file not being malicious

MD5 Hash of .exe file — aff4bb9b15bccff67a112a7857d28d3f2f436e2e42f11be14930fe496269d573

To gain some closure, let’s consult Hybrid-Analysis to analyze the exe file

We have been given the all-clear. The SOC Alert looks like a false-positive so far

Since the file is marked as clean, there are other threat indicators

Let’s go with Other

A)Other

Check if the malware is quarantined/cleaned

A) Malware is not cleaned

Analyze Malware

Analyze malware in 3rd party tools and find C2 address

You can use the free products/services below.

AnyRun
VirusTotal
URLHouse
URLScan
HybridAnalysis

As we have previously analyzed the exe file and found that it was not malicious, let’s proceed by marking it as non-malicious

A)Non malicious

Add Artifacts

Let’s add the artifacts so far collected

Analyst Note

Preceding the closure of the alert, let’s provide some notes on things observed while working.

Finish playbook

Close Alert

Alert Scorecard

All right! Onward ahoy to the next alert

Summary of the alert

The SOC Analyst was alerted to an occurrence of malware being downloaded and subsequently detected. An analysis was made on the .exe attachment, which was a WinRAR software clone, on VirusTotal and AnyRun.It gave us the conclusion of the downloaded file testing as a false positive for malware

Conclusion

Thank you for reading this blog entry, and stay tuned as I try to close down more SOC alerts……

Your opinion matters

My audience has a voice. Feel free to reach out to me, on my socials (links are on top of this page) for any queries to be addressed. Dropping a sweet message would make my day

Let your opinion about this write-up be known, by giving it a clap!

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store