MISP Exercise 2
Last updated
Last updated
The Malware Information Sharing Platform can be used for tracking different types of security incidents in your company. In this Lab you will learn how to compose Events in MISP with focus on phishing emails.
Starting docker image
cd /home/hacker/misp-docker-image docker-compose up
Login with the following credentials:
User: investigator@misp-lab2.com Password: compass
The IT department notified you, that several employees in your company received a phishing email from Microsoft. Fortunately, nobody clicked on the malicious link. Your job is now, to record this security incident as an event in your MISP instance.
You should see now the Add Event prompt. Here you just fill in the basic information about your incident. Detailed information will be recorded later.
Date: Please fill in here, when the event occurred (in this case the date, when the email was received)
Distribution: Since you don't want to share your event to other organisations now, set distribution as Your organisation only
Threat Level: The thread level can be set as Low, nobody clicked on the link.
Analysis: Set Analysis to Initial - The Event has just been created
Event Info: Write a quick description about the event.
Extends Event: This can be left blank. You don't have any special ID for your event. MISP will generate one automatically for you.
Click the Submit button to save your new event.
Unfortunately, you can't get any useful information about the source from that screenshot. Lucky, they attached the original message for you. Please download the mail phishing-mail-1.eml
and open it with your preferred editor. As you can see, the sender tried to fool the spam filter of your mail server.
You have provided now all information for this given event.
Click on Add Object -> All Objects -> email
First seen date / Last seen date: 2021-11-10
First seen time / last seen time: 16:03:09+01:00
Screenshot: Upload the screenshot
Subject: Your account will be deleted permanently
To: marius.zindel@ost.ch
From-display-name: MlCROSOFT
From: eve.johnson4242@gmail.com
Eml: Upload the EML file
Email-body: Copy and paste the body from the EML file
Ip-src: 209.85.216.46
I did convert the eml file to a html file with the following command:
If you have filled in the provided information, click the Submit and then the Create new object button.
You properly noticed, that the sender email address is eve.johnson4242@gmail.com. So it is quite possible that our sender's name is Eve Johnson. Let's add her as an attribute to our event.
Click on Add Attribute and a new prompt will open.
Category Person
Type first-name
Distribution Inherit event
Value Eve
Repeat this step and create a second attribute for the lastname.
The goal is it now, to link the first-name with the last-name, so you're able to see the correlation between these names. Go back to your Event and select the two checkboxes from the already created Person attributes and click the Group selected Attributes into an Object Button.
The IT service desk notified you, that somebody again sent some phishing emails to your company. The screenshot looks to you quite familiar:
Create again a new MISP event, but don't add any objects or attributes yet.
If you need assistance, recap step 3.
Download the second eml file phishing-mail-2.eml and open it with your preferred editor.
Unlike before, you don't add the informations manual "by hand". In this step, you will use the Freetext import.
This can be done by clicking on Populate from... -> Freetext import
You have now successfully created two different event. You suspect that they are most likely related. To analyse the correlation between events you can use the Correlation Graph Tool.
Open the tool by clicking View Correlation Graph.
FLAG: eve.johnson4242@gmail.com
What is the difference between attributes and objects in an event?
Why are you just able to merge to person object and not to a employee object in step 6?
Why does the IP address not show up as a correlation between the two events?
Attributes are single piece of informations like network indicators for a specific MISP Event. You can put different attributes that belong together to an object. An object is like a container with different attributes.
2. That's because we didn't create a attribute for employee yet.
3. Ther's no correlation because the senders IP address is different.