Today we will be reviewing Mr.Natural’s malicious activity which is also a little quiz. This will just be a simple pcap review but within the pcap you can extract the malware to analyze statically or launch it and see what it does dynamically.

  • LAN Segment – 10.12.1.0/24
  • DC – MrNatural-DC
  • Gateway – 10.12.1.1

First thing I look for is http get/response requests

Who did it?

I want to see if I can find any kind of suspicious requests that interacted with our host so far t497sword.com sticks out like a sore thumb and the target was host DESKTOP-NATURAL. so we will want to keep that noted. But we want to see what is possibly happening between these two and one way to start is a TCP Stream.

The evil starter – our invader!

As you can see in the beginning of the request and we can see the entire GET request of the malicious url link. Also knowing this is one of the lower numbers of the packet count this is possibly where the malware begins.

I decided I wanted to get a brief look at our host as that is important on who to talk too after the analysis. The Computer name is DESKTOP-NATURAL and it Looks like our victim is wonderful “fabulous.dale”, now don’t always assume our host downloaded the malware himself he could’ve been compromised and logged in to a different location on our network to exploit us BUT based off of other packets in our pcap this is most definitely the users fault.

fabulous.dale isn’t having a fabulous time.

Now lets investigate more into our host and see what kind of conversations have been unfolding. Now I usually analyze conversation from most to least packets exchanged.

You can always resolve IP addresses to Domain Names be careful as this can be flooded and sometimes misleading.

Our hosts best friend is 206.189.56.140 and we want to see what kind of conversations have been exchanged between them.
Already I can see another malicious domain. You also have the option to resolve IP to Domain names in the conversations window.

wendi4kcash.[url] loves to conversate with our host.

and I start to analyze the TCP stream, from their I notice another domain and it looks like all of this is referring to a Internet Widget pty Ltd. So what sometimes happens is malware reaches out to multiple C2 Servers and unfortunately I don’t have the live alerts of this malware but they tend to “Beacon” saying “Hey I am here! Can you hear me out there!” or they will actively connect to malicious domains to download different kinds of malware. Follow the TCP STREAM!!!!!!!!!

rockcastle.best tied to a Internet Widgets PTY LTD

After that I wanted to investigate more into “Internet Widget pty ltd” and thankfully this pcap isn’t flooded with thousands of domains. I did discover woodenbruus which also showed “Internet Widgets pty LTD” again you follow the TCP stream. They tend to uncover a lot of information on what is happening besides all the “gibberish” characters.

woodenbruus.cyou is also apart of this Internet Widgets PTY ltd

after I investigate majority if not all of the malicious domains I now look into objects. BE VERY CAREFUL as this can download live malware and last thing you want to do is extract malware and end up being like our wonderful friend dale. This is how you can extract the hash for the malware and compare it to virustotal and you can analyze the malware with appropriate tools. Sadly that won’t be apart of this but I will be extracting malware and providing insight on what is the malware doing and what is happening in future posts.

t497sword was the big culprit and you can see the executable. CAUTION if you extract the object.

Also if you happen to analyze the CnC Alerts you’ll see its a IcedID also know as a BokBot which is a banking trojan. This malware acts as a dropper for other malware that’s why our good friend t497 was reaching out to various domains to download more malware to abuse the system. Fabulous dale was probably working in a financial institute and BokBot decided it was time to extract some info. Here is some Virus total information

Used the file URL but when utilize VirusTotal use every possible confirmation from file url, actual file and hash to get accurate results.

Overall this was a fun analysis and sadly I couldn’t do a full report such as extracting malware and dissecting it but I will try my best for future posts to put full reports. If you have any questions please reach out to me via Social Media or Email.
Malware Source – https://www.malware-traffic-analysis.net/2020/12/03/index.html
IcedID information – https://www.cisecurity.org/white-papers/security-primer-icedid/