This project focuses on investigating malicious activity using the ANY.RUN online malware hunting service and the Mitre ATT&CK Matrix.
This project focuses on investigating malicious activity using the ANY.RUN online malware hunting service and the Mitre ATT&CK Matrix.
- ANY.RUN: An interactive malware sandbox for dynamic analysis.
- Mitre ATT&CK Matrix: A knowledge base of adversary tactics and techniques.
- Part 1: Investigate Indicators of Compromise (IOCs) using ANY.RUN.
- Part 2: Analyze malicious activities and determine tactics and techniques using Mitre ATT&CK.
- Part 3: Examine additional malicious activities and their associated dangers.
Each part is separated detailing each phase of the lab analysis.
This project is for educational purposes only.
The table below contains the list of the IOCs (hash values) and the analysis results (whether they are malicious, suspicious, or benign).
| MD5 Hash | Malicious / Suspicious / Benign | Associated Filename |
|---|---|---|
| 2fd03624e271ec70349ce56fb30f563b | Malicious | wireframe.exe |
| c419df63e0121d72411285780c2fc6cc | Suspicious | Updreg.EXE |
| 3acf52e5a62d50bdcedcb89174bf5492 | Benign | BACs_Payment2847.html |
| 766b774626947000e67e0b318f558e94 | Malicious | gh2st.exe |
| 422a6ca28a7e4d8e5e498523c6f049f4 | Malicious | file1.exe |
| b497845beb135740e6caed03a2020036 | Suspicious | winlogon.exe |
This part includes the details of the investigation process for the malicious activity using the ANY.RUN sandbox. It includes the process tree, reports, and relevant findings.
- wireframe.exe
- cmd.exe
- timeout.exe
- NvidiaGPU.exe
9C83A89EA0E56D5AF9AA37D2DABED20B2412DB8C9694A13128EA173A73557487
ASYNCRAT detected.
- Malicious Activities Detected: 4 tactics, 5 techniques, and 16 events are related to this malicious activity
- Tactics: Execution, Persistence, Privilege Escalation, Discovery
- Techniques: Boot or Logon Autostart Execution
This part contains a detailed report of the second malicious hash analysis, including process trees, report details, and ATT&CK matrix analysis.
- gh2st.exe
- cmd.exe
88DD2037D0C43ABACEBAD866DF3F8CCD2EE7D64B01405AA6756A3A1C2FAC28FA
- Steals credentials from Web Browsers
- Connects to CnC server
- REDLINE detected
- Malicious Activities Detected: 3 tactics, 7 techniques, and 245 events are related to this malicious activity
- Tactics: Credential access, Discovery, and Collection
- Techniques: Credential from Password Stores, Unsecured Credentials, Software Discovery, and Email Collection
- file1.exe
F7B1639B6C4CA677BA279B945A94C5F6D67E6C4C89FD39CD8BE882A8A7CDFCAA
- Steals credentials from Web Browsers
- Connects to CnC server
- REDLINE detected
- Malicious Activities Detected: 3 tactics, 7 techniques, and 1525 events are related to this malicious activity
- Tactics: Credential access, Discovery, and Collection
- Explain how forensic analysis and incident response is very much like law enforcement trying to solve a criminal case.
- Similar to police detectives, forensic analysts must collect evidence, validate incidents, and analyze them to identify criminals or malicious actors.
- What is Redline?
- RedLine Stealer is a malware that collects sensitive data such as passwords, credit card details, and other personal information from browsers and infected systems.




