Writeup: Advent of Cyber 4 Day 6 - AtomicMaya/knowledge-base GitHub Wiki
Advent of Cyber 4 - Day 6
Link: Advent Of Cyber 4 on TryHackMe
Question 1
What is the email address of the sender?
We look at the .eml file for details, specificall the From: header.

Answer: [email protected]
Question 2
What is the return address?
We look at the Return-Path: header.
Answer: [email protected]
Question 3
On whose behalf was the email sent?
Once more, we look at the From: header.
Answer: Chief Elf
Question 4
What is the X-spam score?
We look at the X-Pm-Spamscore: header.
Answer: 3
Question 5
What is hidden in the value of the Message-ID field?
We get the value in the field, notice it is base64 encoded, and get the decoded string using echo -n "QW9DMjAyMl9FbWFpbF9BbmFseXNpcw==" | base64 -d.

Answer: AoC2022_Email_Analysis
Question 6
Visit the email reputation check website provided in the task. What is the reputation result of the sender's email address?

Answer: RISKY
Question 7
Check the attachments. What is the filename of the attachment?
We process the .eml file using emlAnalyzer like so: emlAnalyzer -i Urgent\:.eml --header --html -u --text --extract-all (make sure to be in the same directory as the .eml file)
Then look under Attachment Extracting.

Answer: Division_of_labour-Load_share_plan.doc
Question 8
What is the hash value of the attachment?
We simply take the extracted file at $PWD/eml_attachments/Division_of_labour-Load_share_plan.doc and use sha256sum like so:
sha256sum eml_attachments/Division_of_labour-Load_share_plan.doc

Answer: 0827bb9a2e7c0628b82256759f0f888ca1abd6a2d903acdb8e44aca6a1a03467
Question 9
Visit the Virus Total website and use the hash value to search. Navigate to the behaviour section. What is the second tactic marked in the Mitre ATT&CK section?
After pasting the hash in VT, we need to go to the BEHAVIOR tab, and scroll down to find the MITRE ATT&CK Tactics and Techniques

Answer: Defense Evasion
Question 10
Visit the InQuest website and use the hash value to search. What is the subcategory of the file?
After pasting the hash in InQuestLabs, we get a reference to the documentation for a malicious file. By clicking on this reference, we find the subcategory:

Answer: macro_hunter