Introduction

This lab investigates a cyber attack involving a phishing email that led to ransomware execution. By analyzing email artifacts, network traffic, and malware behavior, we aim to uncover how the initial compromise occurred and how the malicious payload was delivered. The phishing email used social engineering to trick the victim into opening a deceptive attachment, which executed hidden malware. Once triggered, the malware initiated malicious activities, including external communications, payload downloads, and file encryption, disrupting the victim’s system. Identifying these attack vectors is crucial for understanding how threat actors bypass security defenses.

Using different forensic techniques such as packet analysis in NetworkMiner and Wireshark, hash lookups, and VirusTotal intelligence, we examine how the malware communicates with external domains and exploits vulnerabilities. A key part of this analysis involves reviewing HTTP traffic to identify redirects from a compromised website to an attacker-controlled server hosting an exploit kit.

This lab highlights the importance of email security, endpoint protection, and proactive threat analysis in defending against phishing and exploit-based attacks. By dissecting each phase of the attack, we gain a deeper understanding of the techniques used by cybercriminals and how we can help mitigate such threats.


Unlock Your Full Learning Experience with BlueYard Labs

Sign up to track your progress, unlock exclusive labs, and showcase
your achievements—begin your journey now!
Join for Free