Writeup: Advent of Cyber 4 Day 6 - AtomicMaya/knowledge-base GitHub Wiki

Advent of Cyber 4 - Day 6

Link: Advent Of Cyber 4 on TryHackMe

Question 1

What is the email address of the sender?

We look at the .eml file for details, specificall the From: header.

Answer: [email protected]

Question 2

What is the return address?

We look at the Return-Path: header.

Answer: [email protected]

Question 3

On whose behalf was the email sent?

Once more, we look at the From: header.

Answer: Chief Elf

Question 4

What is the X-spam score?

We look at the X-Pm-Spamscore: header.

Answer: 3

Question 5

What is hidden in the value of the Message-ID field?

We get the value in the field, notice it is base64 encoded, and get the decoded string using echo -n "QW9DMjAyMl9FbWFpbF9BbmFseXNpcw==" | base64 -d.

Answer: AoC2022_Email_Analysis

Question 6

Visit the email reputation check website provided in the task. What is the reputation result of the sender's email address?

Answer: RISKY

Question 7

Check the attachments. What is the filename of the attachment?

We process the .eml file using emlAnalyzer like so: emlAnalyzer -i Urgent\:.eml --header --html -u --text --extract-all (make sure to be in the same directory as the .eml file)

Then look under Attachment Extracting.

Answer: Division_of_labour-Load_share_plan.doc

Question 8

What is the hash value of the attachment?

We simply take the extracted file at $PWD/eml_attachments/Division_of_labour-Load_share_plan.doc and use sha256sum like so:

sha256sum eml_attachments/Division_of_labour-Load_share_plan.doc

Answer: 0827bb9a2e7c0628b82256759f0f888ca1abd6a2d903acdb8e44aca6a1a03467

Question 9

Visit the Virus Total website and use the hash value to search. Navigate to the behaviour section. What is the second tactic marked in the Mitre ATT&CK section?

After pasting the hash in VT, we need to go to the BEHAVIOR tab, and scroll down to find the MITRE ATT&CK Tactics and Techniques

Answer: Defense Evasion

Question 10

Visit the InQuest website and use the hash value to search. What is the subcategory of the file?

After pasting the hash in InQuestLabs, we get a reference to the documentation for a malicious file. By clicking on this reference, we find the subcategory:

Answer: macro_hunter