Scenario

A SOC Analyst at Umbrella Corporation is going through SIEM alerts and sees the alert for connections to a known malicious domain. The traffic is coming from Sara’s computer, an Accountant who receives a large volume of emails from customers daily. Looking at the email gateway logs for Sara’s mailbox there is nothing immediately suspicious, with emails coming from customers. Sara is contacted via her phone and she states a customer sent her an invoice that had a document with a macro, she opened the email and the program crashed. The SOC Team retrieved a PCAP for further analysis.

https://blueteamlabs.online/home/challenge/network-analysis-malware-compromise-e882f32908


1- What’s the private IP of the infected host?

10.11.27.101

Screenshot 2025-06-29 035356.png

Screenshot 2025-06-29 042452.png

Screenshot 2025-06-29 042040.png

image.png

at the first packet we see this ip visited this weird domain and when investigating the domain we found its malicious and even downloaded a malware so we know that’s the victim ip

2- What’s the malware binary that the macro document is trying to retrieve?

spet10.spr

Screenshot 2025-06-29 040728.png

Screenshot 2025-06-29 041205.png

Screenshot 2025-06-29 040056.png

so i asked my self what protocol was used to retrieve and by looking at protocol hierarchy can only find http so now we know its a http with get request

3- From what domain HTTP requests with GET /images/ are coming from?