4ensiX

4ensiX

FPと言ったものはFPを選んだが表示はTPになっていることに気づいた。

LetsDefend level 1 alert SOC101 - Phishing Mail Detected event-id 18

Details

EventID: 18
Event Time: Sept. 22, 2020, 3:35 p.m.
Rule: SOC101 - Phishing Mail Detected
Level: Security Analyst
SMTP Address 172.82.128.241
Source Address david@cashbank.com
Destination Address katharine@letsdefend.io
E-mail Subject URGENT! Your bank account may have fallen into the hands of fraudsters!
Device Action Allowed

URGENT! Your bank account may have fallen into the hands of fraudsters!

From: david@cashbank.com Sept. 22, 2020, 3:35 p.m.
To: katharine@letsdefend.io Sept. 22, 2020, 3:35 p.m.

Hi,

I'm working in the CASHBANK fraud department. We urgently expect information from you about the following topic.

I tried to reach you by phone but I could not reach you because your phone was turned off.

We detected suspicious activities in your account. We suspect fraudsters have taken over your credit card.

Can you quickly check your attached credit card statement and return to us?

Yours truly.

Attachments
7299c49dd85069e47d6514ab5e10c264.zip

playbook

Are there attachments or URLs in the email?

Answer: Yes

Analyze Url/Attachment

送信側アドレス

cashbank[.]com

VirusTotal: https://www.virustotal.com/gui/domain/cashbank.com

172.82.128.241

VirusTotal: https://www.virustotal.com/gui/ip-address/172.82.128.241
ドメインもIPもMaliciousとは言えない。

mail Attachments

$ md5sum creditcard 
7299c49dd85069e47d6514ab5e10c264  creditcard

これは、LetsDefend level 1 alert SOC107 - Privilege Escalation Detected event-id 19 - 4ensiXで解析したものと同じであった。

Answer: Malicious

Check If Mail Delivered to User?

Device Action Allowed

アラートと以前の調査から、届いた上で実行している。
Answer: Delivered

Check If Someone Opened the Malicios File/URL?

以前の調査から、実行してしまっている。
Answer: Opened

Add Artifacts

Value Type Comment
david@cashbank.com E-mail Sender
7299c49dd85069e47d6514ab5e10c264 MD5 Hash CVE-2017-16995, Privilege Escalation

End

f:id:Zarat:20220407215802p:plain
close alert event-id 18