6 min to read
TryHackMe - Warzone 1 - Write-Up
You received an IDS/IPS alert. Time to triage the alert to determine if its a true positive.

The TryHackMe room Warzone 1 can be found here.
You work as a Tier 1 Security Analyst L1 for a Managed Security Service Provider (MSSP). Today you’re tasked with monitoring network alerts.
A few minutes into your shift, you get your first network case: Potentially Bad Traffic and Malware Command and Control Activity detected. Your race against the clock starts. Inspect the PCAP and retrieve the artifacts to confirm this alert is a true positive.
Today we’ll be looking at the TryHackMe room Warzone 1 and trying to determine if an alert we received is a false positive or the symptom of something more serious. Let’s get started!
Booting up the VM, we are greeted with a Linux desktop:
Of note, this desktop contains a packet capture file called Zone1.pcap
and folder titled “Tools” which contains an installation of Brim and Wireshark – both of which will prove critical in our log analysis.
Let’s look at our first challenge question.
What was the alert signature for Malware Command and Control Activity Detected?
We begin by opening the provided Zone1.pcap
file in Brim:
Right away, we can see an alert with the category “Malware Command and Control Activity Detected” in it, but to make it more clear, let’s search the phrase and display only those results:
In this, we can see our answer in the alert.signature
column:
Answer: ET MALWARE MirrorBlast CnC Activity M3
What is the source IP address? Enter your answer in a defanged format.
In the same image, we can see the answer…
…but we’d like it defanged, or rendered inert, so it can’t accidentally cause harm during our investigation.
That’s no problem to do on our own – just put brackets around each period – but we can use a tool like CyberChef if we’re lazy we want to be sure we did it right:
Answer: 172[.]16[.]1[.]102
What IP address was the destination IP in the alert? Enter your answer in a defanged format.
Next to the source IP, we can find the destination IP:
And again we can use CyberChef to defang:
Answer: 169[.]239[.]128[.]11
Still in VirusTotal, under Community, what threat group is attributed to this IP address?
Switching to VirusTotal, we can search up the destination IP address and find some information about it:
TA505? That sounds like a threat actor designation.
Yep – the MITRE ATT&CK framework has an entry on these guys. There’s our answer.
Answer: TA505
What is the malware family?
We can get the answer from the same page. The Community tab keeps mentioning something called “MirrorBlast”.
Seems heavily associated with TA505, worth looking into.
The above article from Heimdal confirms that TA505 is thought to be using MirrorBlast, much like VirusTotal associated to the above IP address. This is our answer!
Answer: MirrorBlast
Do a search in VirusTotal for the domain from question 4. What was the majority file type listed under Communicating Files?
This question asks us to switch to the Relations tab to look at Communicating Files.
Almost every one of the file types is a Windows Installer file.
Answer: Windows Installer
Inspect the web traffic for the flagged IP address; what is the user-agent in the traffic?
We’ll turn to our friend Wireshark to inspect the provided PCAP file for web traffic. We take the IP address we found earlier and search for HTTP requests it was involved with.
Opening the highlighted packet and scrolling down to the Hypertext Transfer Protocol section, we find the User-Agent.
Answer: REBOL View 2.7.8.3.1
Retrace the attack; there were multiple IP addresses associated with this attack. What were two other IP addresses? Enter the IP addressed defanged and in numerical order. (format: IPADDR,IPADDR)
Scrolling through the HTTP logs, we do see the Source make contact with some other IP addresses:
Answer: 185[.]10[.]68[.]235, 192[.]36[.]27[.]92
What were the file names of the downloaded files? Enter the answer in the order to the IP addresses from the previous question. (format: file.xyz,file.xyz)
The first file name takes a bit of digging, as we have to look in the response from 185[.]10[.]68[.]235 to see the file’s name…
…But the second one is plain as day without opening the packet.
Answer: filter.msi
, 10opd3r_load.msi
Inspect the traffic for the first downloaded file from the previous question. Two files will be saved to the same directory. What is the full file path of the directory and the name of the two files? (format: C:\path\file.xyz,C:\path\file.xyz)
To find our answers we’ll want to follow the TCP stream of the packet where the .msi
file was found.
This will open the communication stream between both hosts:
The question tells us we should expect the files to be found at a path beginning C:\
, so we’ll search for that in Find:
field.
In doing so we find our answers:
Answer: C:\ProgramData\001\arab.bin
, C:\ProgramData\001\arab.exe
Note: We get the full path from C:\ProgramData\001\arab.bin
, and since the question says both files are found in the same path, we can deduce the full path for arab.exe
.
Now do the same and inspect the traffic from the second downloaded file. Two files will be saved to the same directory. What is the full file path of the directory and the name of the two files? (format: C:\path\file.xyz,C:\path\file.xyz)
We need only repeat this process for the second downloaded file.
Answer: C:\ProgramData\Local\Google\rebol-view-278-3-1.exe
, C:\ProgramData\Local\Google\exemple.rb
EOF
With all this information we’ve come up with, we can confirm this is a true positive found by our IDS/IPS! Our next steps would be to begin remediating the observed affects of the intrusion, but that is outside the scope of this room.
Tools used: Brim, VirusTotal, Wireshark