Pyramid of Pain:



TASK 1: Introduction

·       This well-renowned concept is being applied to cybersecurity solutions like Cisco SecuritySentinelOne, and SOCRadar to improve the effectiveness of CTI (Cyber Threat Intelligence), threat hunting, and incident response exercises.

·       Understanding the Pyramid of Pain concept as a Threat Hunter, Incident Responder, or SOC Analyst is important.

 

TASK 2: Hash Values (Trivial)

·       The hash value is a numeric value of a fixed length that uniquely identifies data. A hash value is the result of a hashing algorithm

·       Most common hashing algorithms: MD5 (128-bits), SHA-1 (160-bits), and SHA-2 (256-bits)

·       Security professionals usually use the hash values to gain insight into a specific malware sample, a malicious or a suspicious file, and as a way to uniquely identify and reference the malicious artifact

·       Various online tools can be used to do hash lookups like VirusTotal and Metadefender Cloud - OPSWAT

Question 1: Analyse the report associated with the hash "b8ef959a9176aef07fdca8705254a163b50b49a17217a4ff0107487f59d4a35d" here. What is the filename of the sample?

Answer 1: Sales_Receipt 5606.xls

 

TASK 3: IP Address (Easy)

·       Every device in associated with an IP address

·       In the Pyramid of Pain, IP addresses are indicated with the color green

·       One of the ways an adversary can make it challenging to successfully carry out IP blocking is by using Fast Flux

·       According to Akamai, Fast Flux is a DNS technique used by botnets to hide phishing, web proxying, malware delivery, and malware communication activities behind compromised hosts acting as proxies. The purpose of using the Fast Flux network is to make the communication between malware and its command and control server (C&C) challenging to be discovered by security professionals

Question 1: Read the following report to answer this question. What is the first IP address the malicious process (PID 1632) attempts to communicate with? 

Answer 1: 50.87.136.52

Question 2: Read the following report to answer this question. What is the first domain name the malicious process ((PID 1632) attempts to communicate with?

Answer 2: craftingalegacy.com


 

TASK 4: Domain Names (Simple)

·       Domain Names are indicated with color teal

·       Domain Names can be thought as simply mapping an IP address to a string of text

·       Punycode is a way of converting words that cannot be written in ASCII, into a Unicode ASCII encoding

·       Attackers usually hide the malicious domains under URL Shorteners

Question 1: Go to this report on app.any.run and provide the first suspicious URL request you are seeing, you will be using this report to answer the remaining questions of this task.

Answer 1: craftingalegacy.com

Question 2: What term refers to an address used to access websites?

Answer 2: domain name

Question 3: What type of attack uses Unicode characters in the domain name to imitate the a known domain?

Answer 3: punycode attack

Question 4: Provide the redirected website for the shortened URL using a preview: https://tinyurl.com/bw7t8p4u

Answer 4: https://tryhackme.com

 

TASK 5: Host Artifacts (Annoying)

·       Host Artifacts are a step up to the yellow zone

·       Host artifacts are the traces or observables that attackers leave on the system, such as registry values, suspicious process execution, attack patterns or IOCs (Indicators of Compromise), files dropped by malicious applications, or anything exclusive to the current threat

Question 1: A process named regidle.exe makes a POST request to an IP address on port 8080. What is the IP address?

Answer 1: 96.126.101.6

Question 2: The actor drops a malicious executable (EXE). What is the name of this executable?

Answer 2: G_jugk.exe

Question 3: Look at this report by Virustotal. How many vendors determine this host to be malicious?

Answer 3: 9


 

TASK 6: Network Artifacts (Annoying)

·       Network Artifacts also belong to the yellow zone in the Pyramid of Pain

·       A network artifact can be a user-agent string, C2 information, or URI patterns followed by the HTTP POST requests

·       Network artifacts can be detected in Wireshark PCAPs (file that contains the packet data of a network) by using a network protocol analyzer such as TShark or exploring IDS (Intrusion Detection System) logging from a source such as Snort

·       Tshark command to filter out the User-Agent strings: tshark --Y http.request -T fields -e http.host -e http.user_agent -r [file_name].pcap

Question 1: What browser uses the User-Agent string shown in the screenshot above?

Answer 1: Internet Explorer

Question 2: How many POST requests are in the screenshot from the pcap file?

Answer 2: 6

 

TASK 7: Tools (Challenging)

·       At this stage, we have levelled up our detection capabilities against the artifacts. The attacker would most likely give up trying to break into your network or go back and try to create a new tool that serves the same purpose

·       Fuzzy hashing is also a strong weapon against the attacker's tools. Fuzzy hashing helps you to perform similarity analysis - match two files with minor differences based on the fuzzy hash values

Question 1: Provide the method used to determine similarity between the files

Answer 1: Fuzzy Hashing

Question 2: Provide the alternative name for fuzzy hashes without the abbreviation 

Answer 2: context triggered piecewise hashes

 

TASK 8: TTPs (Tough)

·       TTPs stands for Tactics, Techniques & Procedures. This includes the whole MITRE ATT&CK Matrix, which means all the steps taken by an adversary to achieve his goal, starting from phishing attempts to persistence and data exfiltration

Question 1: Navigate to ATT&CK Matrix webpage. How many techniques fall under the Exfiltration category?

Answer 1: 9

Question 2: Chimera is a China-based hacking group that has been active since 2018. What is the name of the commercial, remote access tool they use for C2 beacons and data exfiltration?

Answer 2: Cobalt Strike



Comments