Investigating IOCs

Scenario 1

Your incident response team has quarantined a suspicious bin file. The team thinks it is a ransomware variation. Investigate and create indicators for the file.

You can find the shellcode under C:\Users\Jon\Documents\Scenarios\Scenario 1

Scenario 2

You have been assigned to analyze this week's quarantined files. The file is thought to be an unknown trojan or a new strain of the emotet malware. Investigate and create indicators for the file.

You can find the shellcode under C:\Users\Jon\Documents\Scenarios\Scenario 2

Read the above and complete the investigations

What is the name of the file from Scenario 1?

What is the size of the file from Scenario 1 in bytes?

What is the size on disk of the file from Scenario 1 in bytes?

What is the MD5 hash of the file from Scenario 1?

What is the name of the file from Scenario 2?

What is the size of the file from Scenario 2 in bytes?

What is the size on disk of the file from Scenario 2 in bytes?

What is the MD5 hash of the file from Scenario 2?

Create IOCs for both files using IOCe.

Last updated

Was this helpful?