CyberDefenders: AzurePot Lab
CyberDefenders: AzurePot Lab
Overview
In this lab, I will analyze a compromised Ubuntu Linux honeypot that was deployed on Microsoft Azure in October 2021. The honeypot was specifically designed to attract attackers exploiting CVE-2021-41773, a critical vulnerability in Apache HTTP Server that allows for path traversal and remote code execution (RCE). This vulnerability was actively targeted in the wild, which made the honeypot an ideal environment to observe real-world attack techniques.
Upon deployment, the system experienced numerous attacks, primarily from crypto-mining malware. To maintain a controlled environment and prevent resource exhaustion from rampant crypto-mining, a cron job was implemented to periodically remove files associated with common miners. This setup allowed the honeypot to remain operational for extended periods, and it captured more diverse and sophisticated attack behaviors.
The lab provides three primary forensic artifacts for analysis:
sdb.vhd.gz–> A Virtual Hard Disk (VHD) snapshot of the main drive, captured via an Azure disk snapshot. This image allows for endpoint forensics on the file system, including the examination of scheduled tasks, malicious scripts, and other artifacts left by attackers.ubuntu.20211208.mem.gz–> A memory dump acquired using the LiME (Linux Memory Extractor) tool. Memory analysis helps uncover running processes, network connections, in-memory artifacts, and traces of executed commands, offering insights into volatile data that might not be present in the disk image.uac.tgz–> The results from running Unix Artifact Collector (UAC) on the system. UAC collects extensive information about running processes, open files, network connections, and user activity, providing a snapshot of system behavior at the time of collection.
As a Security Operations Center (SOC) Analyst, my task is to analyze these artifacts to uncover how the system was compromised, identify the actions taken by the attackers, and assess the tools and techniques used. The lab covers a broad range of cybersecurity concepts, including malware execution, defense evasion, and command and control (C2) activities. Throughout this lab, I will use tools like FTK Imager for disk analysis, Volatility for memory forensics, and command-line utilities like grep and awk for data parsing. This lab will not only help me identify indicators of compromise (IOCs) but also deepen my understanding of forensic methodologies and attacker behavior in a real-world cloud environment.
Question 1
Question 1: File sdb.vhd -> There is a script that runs every minute to do cleanup. What is the name of the file?
To identify the script that runs every minute to perform cleanup in the provided sdb.vhd file, I will begin by utilizing FTK Imager, a widely-used forensic imaging tool designed for acquiring, analyzing, and mounting forensic images without altering the original data. This tool is essential for investigators who need to access and examine digital evidence while maintaining its integrity. In this scenario, FTK Imager allows me to mount the VHD (Virtual Hard Disk) file, making it accessible as a read-only drive on the system, and it ensures that no modifications occur during analysis. The first step involves launching FTK Imager and using its mounting feature to add the forensic image. When mounting the image, it’s crucial to choose the File System / Read Only option as the mount method.
 > [root] > var > spool > cron > crontabs. Here, I found a file named root, which contains the cron jobs configured for the root user.
 in these fields denote that the task will run at all possible times for that field. For example, an asterisk in the minute field means the task will run every minute.
Within this root cron file, there is a line of particular interest:
- /root/.remove.sh
