SOC Investigation: TA505 MirrorBlast Campaign
Scenario
Platform: TryHackMe (Room: Warzone 1)
Role: Tier 1 SOC Analyst
Objective: Triage a high-priority IDS alert by analyzing a provided packet capture (Zone1.pcap) to confirm Command and Control (C2) activity and identify malicious artifacts.
Executive Summary
Analysis of the provided packet capture (Zone1.pcap) identified strong indicators of a TA505-associated intrusion targeting an internal endpoint. The investigation revealed a sophisticated defense evasion strategy utilizing malicious Windows Installer packages (.msi) to deploy the MirrorBlast malware family.
The core of the attack chain involved proxy execution: bundling a signed interpreter (REBOL) within standard installers to run malicious scripts. This technique reduced detection effectiveness by blending execution into authorized process chains, mimicking Google software directories to evade signature-based tools.
1. Initial Alert Triage
The investigation began with a high-severity alert from the network intrusion detection system (IDS).
- Alert Signature:
ET MALWARE MirrorBlast CnC Activity M3 - Compromised Host:
172.16.1.102 - C2 Infrastructure:
169.239.128.11 - Vector: TCP Port 80 (HTTP)
2. Analytical Findings
Staging and Evasion
The adversary utilized a multi-stage download process to pull down the MirrorBlast loader. The compromised endpoint communicated with two staging servers to download distinct installer files:
filter.msi(hosted on185.10.68.235)10opd3r_load.msi(hosted on192.36.27.92)
The REBOL Abuse Angle
The most significant finding was the use of the legitimate REBOL View 2.7.8.3.1 interpreter. Packet analysis revealed an anomalous HTTP User-Agent string originating from the host, confirming that this non-standard software engine was being used to stage further payloads.
Host Masquerading
By extracting the HTTP streams, I identified the target directories for the dropped payloads. The adversary used a masquerading technique to blend in with legitimate system files:
- Path 1:
C:\ProgramData\001\(containingarab.exe) - Path 2:
C:\ProgramData\Local\Google\(containing the REBOL interpreter and the maliciousexemple.rbscript)
Execution Logic: Evidence suggests the installer invokes the REBOL engine to execute the script:
rebol-view-278-3-1.exe -w -i -s C:/ProgramData/Local/Google/exemple.rb
3. Indicators of Compromise (IoCs)
Network
- C2 Server:
169.239.128.11(fidufagios[.]com) - Staging:
185.10.68.235,192.36.27.92 - User-Agent:
REBOL View 2.7.8.3.1
Host
C:\ProgramData\001\arab.exeC:\ProgramData\Local\Google\rebol-view-278-3-1.exeC:\ProgramData\Local\Google\exemple.rb
4. MITRE ATT&CK Mapping
- T1204.002 (User Execution: Malicious File): Initial infection via user-executed
.msi. - T1036.005 (Masquerading: Match Legitimate Name or Location): Use of Google-themed directories to evade manual inspection.
- T1129 (Shared Modules): proxy execution via a signed, legitimate interpreter — behavior aligns with system binary proxy execution patterns.
- T1071.001 (Application Layer Protocol: Web Protocols): Unencrypted C2 communication over HTTP.
5. Impact & Recommendations
This investigation identified a high-confidence intrusion scenario consistent with TA505 activity.
Recommended Actions:
- Immediate Containment: Isolate host
172.16.1.102and block all identified IoCs at the network perimeter. - Remediation: Purge all identified artifacts in
ProgramData. - Detection Engineering: Develop hunts for non-standard interpreters (REBOL, AutoIt, etc.) communicating externally or executing from user-writable directories.
These findings highlight the need for behavior-based detection focused on unusual interpreter execution from user-writable directories and anomalous HTTP beaconing patterns.