Email Proxy – Phishing Email detected
Alert Analysis & Remediation Runbook
Use Case: Email Proxy – Phishing Email detected- Incident Analysis
Table of Contents
2. Identify Domain\IP and attachment details 4
3. Identify overall endpoint security status 5
4. Identify possible source of this behaviour 6
5. Identify infection radius: 6
3. Identify the location of attachments, processes generated and terminate them: 8
4. Initiate a full review and remediation of the endpoint security 8
5. Identify other impacted systems and perform remediation 8
6. Implement plan to mitigate similar incidents in future 9
Objective:
Below are the steps to be performed in order to analyse triggered alerts
ANALYSIS
Identify the context
Identify the Email ID of sender and recipient(s), subject of the email and attachments.
Check if the mail is allowed or blocked.
Identify the Domain and IP address of the sender.
Identify the AD user name/IP associated with the recipient(s).
Identify if any other mails received from the same domain in last 48 hours
Sample Observations from this checks:
As per the alert information, it is identified that source user ab@cd.com has sent email to lmn@org.com, jkl@org.com with Subject: Sale 123.
As per the alert information, it is identified that two other users also got the mail from same domain cd.com
Identify Domain\IP and attachment details
Check Domain and IP reputation using https:// www.talosintelligence.com
Check if the reputation of the Domain, links and IP is bad or good
Check the Domain name using https://threatcrowd.com which might reveal the intentions of the domain owner
Check if this IP/Domain is actively involved in spreading malware using https://threatcrowd.com . Identify the IOCs related to that malware and check AV logs if those were detected on local machine in last 8 hours
Check the hash values of attachments
Check hash values in https://virustotal.com
Understand the behaviour of malware
Check AV logs for the detection of these malicious files.
Sample Observations from these checks:
As per information from https://www.talosintelligence.com/ the IP is reputation is bad.
As per information from https://virustotal.com and https://threatcrowd.com , this IP involved was having bad reputation and actively involved in spreading malwares.
Per the information from https://virustotal.com the attachments contain malware abc which tries to exploit vulnerability in IE version 6.0.
Identify overall endpoint security status
Check if any redirection, proxy denies and allowed to suspicious IPs/Domains from the user/IP.
Identify if the system is having AV and latest signature
If latest signature are not updated, highlight immediately
Identify if the same system was infected with malwares in last 48 hours and what was the action taken by AV
Check if any new process created /registry changes Process name will reveal if it is malicious or genuine.
Identify any alerts triggered from same system indicating some kind of compromise or infection for last 8 hours
High number of login. failures from same source IP or source user
Proxy denies and allowed to suspicious IPs/Domains
IPS alerts triggered from same source IP/Domain.
High number of firewall denies from same source IP towards Internet/Internal IPs ( Lateral moment )
Privilege elevation of user account
Sample Observations from these checks
Per the logs we have observed high number of proxy denies from the same user towards IP 12.x.x.x and 54.xx.xx.xx. Also this is observed from https://threatcrowd.com
It is identified in ETDR logs that this connection was initiated by abc.exe
As per the logs, this malware was detected in this directory
/temp : This could have been created by other programmes running on this system
/downloads : It is very likely that user must have downloaded this file from browser
/system32: It is very rare that malware are detected here and hence this has potential to cause damage.
Identify possible source of this behaviour
Identify any allowed proxy connections for last 2 hours from this source IP towards uncategorised domains and verify the reputation of other allowed URLS accessed by same IP/User.
Identify any previous mail communications to the domain.
Sample Observations from these checks
Over past 8 hours we have observed the user was accessing URLs categorized under Entertainment, Games and Social Networking.
We did not observe any communication with the domain.
Identify infection radius:
Identify all users receiving the email with same subject or from same domain.
Identify all users receiving files with same hashes or name.
Identify all users trying to communicate with the redirected URLs.
Sample Observations from these Checks:
We also have seen 2 users which have received mails from same domain 123@org.com, 234@org.com.
We have not seen any other users receiving same files or systems made connection towards the redirected URLs in last 8 hours.
Note: The below steps of related to incident analysis could not be performed due to lack of availability of information and access to required log sources. It is recommended that the customer performs these checks.
INCIDENT ANALYSIS
Objective of Response:
This section is required if above analysis revealed a true positive incident. These steps will enable the customer to Identify, Contain, Eradicate and Recover from the incident
Incident response Steps
Block identified blacklisted URLs and IPs at firewall block suspicious email domain at email gateway
Block the identified malicious URLs on proxy.
Confirm that there is no genuine traffic is getting impacted by blocking this IP.
Block the IP temporarily/ permanently. It is recommended to block the IP for 45 days and remove if there are no further connections towards this IP.
Block the malicious email domain at email gateway
Isolate the system
Confirm that there is no business getting impacted and disconnect all the affected systems from network or isolate to restricted vlan.
Identify the location of attachments, processes generated and terminate them:
Identify the location of downloaded attachments and remove them.
Identify the process which initiated connection to malicious IP
Using ETDR
Use Netstat –b to see if the connection is still active and identify which process is initiating this connection
If netsat -b does not reveal this connection as live, then identify all processes running on systems, check hash values and check for their reputation using https://virustotal.com for any malicious process
Terminate identified suspicious process
Identify the entire footprint and artefacts related to that process using
File paths
File names
Registry keys
Schedule tasks
Auto runs
Initiate a full review and remediation of the endpoint security
Delete the email from mail server.
Check if the system is having AV and latest signature
Check if the system is up to date with patches
Check if the systems is having public share folders
Check if the logged in user is having admin rights
Identify other impacted systems and perform remediation
Identify if the malicious process/files/registry key are present on any other systems which made connection towards identified blacklisted IP, URL.
If found, perform the same remediation steps on these systems
If the identified suspicious emails was delivered to multiple users, remove it from all intended recipients.
Implement plan to mitigate similar incidents in future
Enable attachment and URL reputation checks in email gateway.
All well-known mal spam generators should be blocked at email gateway
All well-known blacklisted IPs should be blocked at firewall.
it is recommended to deploy ETDR solution on critical assets
Comments