April 2021 Forensic Quiz: Answers and Analysis - SANS ISC By SANS Internet Storm Center Archived: 2026-04-05 23:42:44 UTC Introduction Thanks to everyone who participated in our forensic quiz originally posted on April 1st, 2021.  We received 22 submissions through our contact page, and two people had all the correct answers.  Unfortunately, we can only pick one winner for the contest.  In this case, our winner was the first to submit the correct information.  Join us in congratulating this month's winner, Alex Rodriguez-Vargas!  Alex will receive this month's prize: a Raspberry Pi 4 kit. Several people came close and almost had everything.  This exercise required reviewing both the pcap and malware recovered from the infected Windows host.  You can still find the pcap and malware here. The pcap of infection traffic for this quiz was generated from a spreadsheet retrieved when I recorded this Youtube video.  The pcap in this month's quiz starts during HTTPS traffic to the "unsubscribe" page seen in the video. Shown above:  Pcap from this quiz filtered in Wireshark, and a list of the malware/artifacts. https://isc.sans.edu/diary/27308 Page 1 of 8 Answers IP address of the infected Windows computer: 192.168.5.125 Host name of the infected Windows computer: LAPTOP-X9NAQ2EU User account name on the infected Windows computer: wilmer.coughlin Date and time the infection activity began in UTC (the GMT or Zulu timezone): 2021-03-29 at 22:18 UTC NOTE: The infection activity could be considered as early as 22:15 UTC which is when the malicious domain gtmers[.]xyz appears.  Or it could be considered as late as 22:22 UTC, which is when the spreadsheet macro successfully downloaded a malicious EXE for BazarLoader. The family or families of malware on the infected computer: BazaLoader (BazarLoader) Cobalt Strike Anchor To help in your analysis of this activity, please review the Prerequisites section in our original blog for this quiz. BazaLoader (BazarLoader) Activity From the malware archive in the Downloads directory under wilmer.coughlin, there is an Excel spreadsheet named subscription_1617056233.xlsb.  This spreadsheet has malicious macros.  I submitted it to the Triage Hatching sandbox, and it generated the following traffic: hxxp://veso2[.]xyz/campo/r/r1 In the pcap, this URL caused a redirect.  First it redirected to: hxxp://admin.youglessindia[.]in/theme/js/plugins/rt3ret3.exe But that follow-up URL did not return any malware.  This happened while I was still recording the Youtube video.  At the video's 10 minute mark, I enable macros on the malicious spreadsheet, but nothing apparently happened.  So the call center operator had me re-open the spreadsheet and enable macros again.  That second time, the campo URL redirected to: hxxp://veso2[.]xyz/uploads/files/rt3ret3.exe https://isc.sans.edu/diary/27308 Page 2 of 8 The above URL returned a Windows executable (EXE) file.  This EXE from the pcap has the same SHA256 hash as the file located in our malware archive at: ProgramData\huqvg\huqvg.exe Of note, opening the spreadsheet and enabling macros generated the following artifacts: Users\Public\4123.do1 Users\Public\4123.xlsb Users\Public\4123.xsg Traffic caused by BazaLoader (BazarLoader) in this pcap is: 176.111.174[.]53 port 80 - veso2[.]xyz - POST /campo/r/r1 104.21.74[.]174 port 80 - admin.youglessindia[.]in - POST /theme/js/plugins/rt3ret3.exe 176.111.174[.]53 port 80 - veso2[.]xyz - POST /uploads/files/rt3ret3.exe 54.184.119[.]29 port 443 - HTTPS traffic 184.72.1[.]208 port 443 - HTTPS traffic port 80 - api.ip[.]sb - GET /ip Of note, the last entry above is an IP address check by the infected Windows host.  I don't normally see that with BazaLoader activity, but I could not positively attibute it to any of the other malware activity in this pcap. Shown above:  Some of the BazaLoader traffic from this infection. Cobalt Strike Activity Cobalt Strike was sent through encrypted HTTPS traffic generated by BazaLoader.  A DLL for Cobalt Strike was saved to the infected host at: https://isc.sans.edu/diary/27308 Page 3 of 8 C:\Users\wilmer.coughlin\AppData\Local\Temp\C618.tmp.dll The run method for the above Cobalt Strike DLL is: rundll32.exe [filename],lowslow This generated the following Cobalt Strike traffic: 217.12.218[.]46 port 80 - 217.12.218[.]46 - GET /YPbR 217.12.218[.]46 port 80 - onedrive.live[.]com - GET /preload?manifest=wac 217.12.218[.]46 port 80 - onedrive.live[.]com - GET /sa There were a great deal of HTTP requests generated by the Cobalt Strike, about 40 to 60 HTTP requests every minute.  Of note, the domain onedrive.live[.]com does not resolve to 217.12.218[.]46, which means this is a deception intentionally generated by the malware.  During the Cobalt Strike traffic, seven HTTP requests to checkip.amazonaws[.]com appear as the infected Windows host periodically checks its IP address. Shown above:  Start of Cobalt Strike activity in the pcap. Anchor Activity Anchor DNS malware uses DNS queries to stealthily communicate to C2 servers.  Our pcap contains DNS activity that follows patterns reported for Anchor.  The associated domains are: sluaknhbsoe[.]com xyskencevli[.]com https://isc.sans.edu/diary/27308 Page 4 of 8 The domain xyskencevli[.]com did not resolve, but sluaknhbsoe[.]com did.  The pcap contains several DNS queries with long strings for sub-domain of sluaknhbsoe[.]com. Shown above:  DNS traffic caused by Anchor DNS malware. This type of DNS tunneling does not rely on direct contact with the the C2 domain.  Malware families like Anchor use this method to disguise tunneling from an Windows infected host.  However, we can easily spot the unusual DNS queries from the pcap. Of note, the following binaries are included in the malware archive: Windows\Temp\adf\anchor_x64.exe Windows\Temp\adf\anchorAsjuster_x64.exe Windows\Temp\adf\anchorDNS_x64.exe The malware archive also contains a scheduled task at: Windows\System32\Tasks\Sun SvcRestartTask#32640 This shows a task to run the following command: Windows\Temp\adf\anchorDNS_x64.exe -s The task is designed to keep Anchor DNS malware persistent on the infected Windows host. https://isc.sans.edu/diary/27308 Page 5 of 8 Shown above:  Scheduled task for Anchor malware. Indicators of Compromise (IOCs) SHA256 hash: ae6dbc08e0e21b217352175f916cfd5269c4fd8d5de6bff2d0a93a366f78e8d1 File size: 181,413 bytes File name: subscription_1617056233.xlsb File description: Spreadsheet with macros for BazaLoader (BazarLoader) SHA256 hash: 291c573996c647508544e8e21bd2764e6e4c834d53d6d2c8903a0001c783764b File size: 242,176 bytes File location: hxxp://veso2[.]xyz/uploads/files/rt3ret3.exe File location: C:\ProgramData\huqvg\huqvg.exe File description: EXE for BazaLoader (BazarLoader) SHA256 hash: cc74f7e82eb33a14ffdea343a8975d8a81be151ffcb753cb3f3be10242c8a252 File size: 299,520 bytes File location: C:\Users\wilmer.coughlin\AppData\Local\Temp\C618.tmp.dll File description: DLL for Cobalt Strike Run method: rundll32.exe [filename],lowslow SHA256 hash: 3ab8a1ee10bd1b720e1c8a8795e78cdc09fec73a6bb91526c0ccd2dc2cfbc28d File size: 251,904 bytes File location: C:\Windows\Temp\adf\anchorAsjuster_x64.exe File description: Anchor malware EXE (1 of 3) Note: This is not inherently malicious on its own, but can be used to run the other two Anchor files. https://isc.sans.edu/diary/27308 Page 6 of 8 SHA256 hash: a8a8c66b155fcf9bfdf34ba0aca98991440c3d34b8a597c3fdebc8da251c9634 File size: 347,648 bytes File location: C:\Windows\Temp\adf\anchor_x64.exe File description: Anchor malware EXE (2 of 3) SHA256 hash: 9fdbd76141ec43b6867f091a2dca503edb2a85e4b98a4500611f5fe484109513 File size: 347,648 bytes File location: C:\Windows\Temp\adf\anchorDNS_x64.exe File description: Anchor malware EXE (3 of 3) HTTPS traffic that returned malicious spreadsheet: 8.209.100[.]246 port 443 - gtmers[.]xyz BazaLoader traffic: 176.111.174[.]53 port 80 - veso2[.]xyz - POST /campo/r/r1 104.21.74[.]174 port 80 - admin.yougleeindia[.]in - POST /theme/js/plugins/rt3ret3.exe 176.111.174[.]53 port 80 - veso2[.]xyz - POST /uploads/files/rt3ret3.exe 54.184.119[.]29 port 443 - HTTPS traffic caused by BazaLoader (BazarLoader) 184.72.1[.]208 port 443 - HTTPS traffic caused by BazaLoader (BazarLoader) IP address checks by the infected Windows host: port 80 - api.ip[.]sb - GET /ip port 80 - checkip.amazonaws[.]com - GET / Cobalt Strike traffic: 217.12.218[.]46 port 80 - 217.12.218[.]46 - GET /YPbR 217.12.218[.]46 port 80 - onedrive.live[.]com - GET /preload?manifest=wac 217.12.218[.]46 port 80 - onedrive.live[.]com - GET /sa Domains used by Anchor malware: sluaknhbsoe[.]com xyskencevli[.]com Final words Another case of type of infection, one where BazaLoader leads to Cobalt Strike and Anchor, was reported here last month.  It even reports the same domains used by Anchor DNS that we see in this month's quiz. Thanks to all who participated, and congratulations again to Alex Rodriguez-Vargas for winning this month's contest! You can still find the pcap and malware here. https://isc.sans.edu/diary/27308 Page 7 of 8 --- Brad Duncan brad [at] malware-traffic-analysis.net Source: https://isc.sans.edu/diary/27308 https://isc.sans.edu/diary/27308 Page 8 of 8