TryHackMe: MISP Walkthrough (SOC Level 1)

Welcome to this walkthrough of the MISP Room on TryHackMe.

In this room we will learn about the Open Source platform MISP. MISP is an open source software solution for collecting, storing, distributing and sharing cyber security indicators and threats about cyber security incidents analysis and malware analysis. MISP is designed by and for incident analysts, security and ICT professionals or malware reversers to support their day-to-day operations to share structured information efficiently.

MISP Room Banner
MISP Room Banner

Room URL: https://tryhackme.com/r/room/misp

This room is part of the SOC Level 1 Path.

I am making these walkthroughs to keep myself motivated to learn cyber security, and ensure that I remember the knowledge gained by these challenges on HTB and THM. Join me on learning cyber security. I will try and explain concepts as I go, to differentiate myself from other walkthroughs.

Now, let’s move on!


Task 1: Room Overview

Alright, let’s get started. TryHackMe incudes the following room overview:

MISP – MALWARE INFORMATION SHARING PLATFORM
This room explores the MISP Malware & Threat Sharing Platform through its core objective to foster sharing of structured threat information among security analysts, malware researchers and IT professionals.
Room Objectives
We will be covering the following areas within the room:
  • Introduction to MISP and why it was developed.
  • Use cases MISP can be applied to
  • Core features and terminologies.
  • Dashboard Navigation.
  • Event Creation and Management.
  • Feeds and Taxonomies.
Room Prerequisites

General familiarity with security concepts is: check out the Pre-Security path and the Jr. Security Analyst room.

At the end of the room, we will have an exercise task to test your knowledge of using MISP.

Questions

Read the Room Overview.

Answer: No answer needed


Task 2: MISP Introduction: Features & Terminologies

MISP (Malware Information Sharing Platform) is an open-source platform for collecting, storing, and sharing threat intelligence and Indicators of Compromise (IOCs) related to malware, cyberattacks, financial fraud, and other cyber threats. It operates within communities of trusted members and supports closed, semi-private, and public sharing models. The platform integrates with tools like Network Intrusion Detection Systems (NIDS), log analysis tools, and Security Information and Event Management Systems (SIEM).

Use Cases:

  • Malware Reverse Engineering: Understanding malware behavior through shared indicators.
  • Security Investigations: Using IOCs to investigate breaches.
  • Intelligence Analysis: Tracking adversary capabilities.
  • Law Enforcement: Supporting forensic investigations.
  • Risk Analysis: Researching and assessing emerging threats.
  • Fraud Analysis: Detecting financial fraud via shared indicators.

Core Functionalities:

  • IOC Database: Stores technical and non-technical threat information.
  • Automatic Correlation: Identifies relationships between attributes and indicators.
  • Data Sharing: Supports distributed sharing among MISP instances.
  • Import & Export Features: Integrates with systems like NIDS, HIDS, and OpenIOC.
  • Event Graph: Visualizes relationships between objects and attributes.
  • API Support: Enables system integration for event and intelligence sharing.

Key Terms:

  • Events: Linked collections of threat data.
  • Attributes: Specific data points in events.
  • Objects & Object References: Composed attributes and their relationships.
  • Sightings: Time-specific detections for credibility.
  • Tags & Taxonomies: Classification and labeling tools.
  • Galaxies: Knowledge bases for labeling events/attributes.
  • Indicators: Data used to detect malicious activity.

Questions

Read the task on MISP and its applicable use cases and terminologies.

Answer: No answer needed


Task 3: Using the System

For you to understand how MISP works and follow along in the task, launch the attached machine and use the credentials provided to log in to the Analyst Account on https://LAB_WEB_URL.p.thmlabs.com/. Wait 1 minute for the URL and lab to start up.

Username: Analyst@THM.thm  Password: Analyst12345&

Dashboard Features

  • Home Button: Returns to the start screen or a custom home page.
  • Event Actions: Manage events, including creation, modification, deletion, publishing, searching, and listing attributes.
  • Dashboard: Create custom dashboards using widgets.
  • Galaxies: Access a list of MISP Galaxies.
  • Input Filters: View or modify rules for data entry, including blocklists and validation rules.
  • Global Actions: Access your profile, manuals, news, active organizations, and contribution histograms.
  • User Options: Notifications, user profile, and logout functionality.

Event Management Workflow

  1. Event Creation:
    • Store general information about incidents or investigations.
    • Define descriptions, risk levels, and distribution levels (e.g., organization-only, community-only, connected communities, or all communities).
    • Optionally use sharing groups for predefined distribution lists.
  2. Populating Events:
    • Use templates for specific categories (e.g., phishing email) to add predefined fields.
    • Add attributes manually or via batch imports (e.g., lists of IP addresses) or integrate data from formats like OpenIOC.
    • Include file attachments (e.g., malware samples, reports) and mark malicious files to ensure secure handling.
    • For Intrusion Detection Systems (IDS): Attributes can be flagged for use in IDS signatures
  3. Publishing Events:
    • After creation, the organisation admin will review and publish events to make them accessible via defined distribution channels. This will also share the events to the distribution channels set during the creation of the events.

This streamlined process enables analysts to effectively track, manage, and share threat intelligence using MISP.

Questions

How many distribution options does MISP provide to share threat information?

There are four distribution options: organization-only, community-only, connected communities, or all communities).

Answer: 4

Which user has the role to publish events?

After creation, the organisation admin will review and publish events to make them accessible via defined distribution channels.

Answer: organisation admin


Task 4: Feeds & Taxonomies

MISP (Malware Information Sharing Platform) uses feeds, taxonomies, and tagging to manage and share security threat information:

Feeds: These provide updated indicators and information about security events. They enable analysts to exchange threat data, preview events, import relevant events, and correlate attributes across different events and feeds. Site admins manage feeds.

Taxonomies: Taxonomies classify information with tags based on standard features or attributes. They help categorize events, indicators, and threat actors, allowing analysts to ensure proper event classification and enrich intrusion detection systems. Taxonomies are managed by the site admin.

Tagging: Tags are used to identify events and attributes based on security indicators. Tags can be global (shared across users) or local (specific to an organization). Analysts can also add unique tags. Tags help in effective sharing of threat information.

Best Practices:

  • Event-level vs Attribute-level: Tags should primarily be applied at the event level, with attribute-level tagging for exceptions.
  • Minimal Tag Set: Must-have tags include:
    • Traffic Light Protocol (TLP): Guides how intelligence can be shared.
    • Confidence: Indicates the trustworthiness of the data.
    • Origin: Describes the source of the information.
    • Permissible Actions Protocol (PAP): Classifies how data can be used for compromise detection.

Difference taxonomies and tags

Wondering about the difference between taxonomies and tags?
Taxonomies are a more structured way to classify information according to predefined categories, while tags are used to label and identify specific attributes or events for easier identification and sharing.

Questions

I have read about MISP Feeds and Taxonomies

Answer: No answer needed


Task 5: Scenario Event

It is time for a scenario, yay! Until now, this room has been very theory heavy. I don’t know about you, but things don’t stick so well for me if it is all theory. So let’s get some real world experience with MISP! Here we go.

CIRCL (Computer Incident Respons Center Luxembourg) published an event associated with PupyRAT infection. Your organisation is on alert for remote access trojans and malware in the wild, and you have been tasked to investigate this event and correlate the details with your SIEM. Use what you have learned from the room to identify the event and complete this task.

Start by starting up the attachment machine in task 3. Login with the provided initials. Let’s move on with question 1.

Questions

What event ID has been assigned to the PupyRAT event?

Search for PupyRAT in the search field on the top right of the screen. You will find the following event:

PupyRAT event
PupyRAT event

The event ID is 1145.

Answer: 1145

The event is associated with the adversary gaining ______ into organisations.

Look carefully at the tags attached to the event. A variety of them mentions “RemoteAccess”. This is the answer to the question.

Answer:Remote Access

What IP address has been mapped as the PupyRAT C2 Server

Click on the Event ID to see the details of the event.

Once you are on the event page, look at the list of attributes in the bottom.

If you search for “command” you will see the following entry:

PupyRAT attribute C&C
PupyRAT attribute C&C

The answer is 89.107.62.39.

Answer:  89.107.62.39

From the Intrusion Set Galaxy, what attack group is known to use this form of attack?

Galaxies in MISP are a method used to express a large object called cluster that can be attached to MISP events or attributes. A cluster can be composed of one or more elements.
You can open the Galaxy by clicking at the tab on the below screenshot:
Galaxy attack group
Galaxy attack group
Here it is mentioned that the attack group is Magic Hound.

Answer:Magic Hound

There is a taxonomy tag set with a Certainty level of 50. Which one is it?

Look at the tag sets in the upper end of the page. One of them is called osint:certainty=”50″.

OSINT taxonomy
OSINT taxonomy

Answer: osint


Task 6: Conclusion

I hope this room provided valuable insights into MISP and its role in sharing malware and threat intelligence. This tool is highly practical for real-world incident reporting. With the knowledge gained, you should now be equipped to effectively document, report, and share incident information.

Questions

Learned about MISP!!

Answer: No answer needed


Congratulations on completing MISP!!!

MISP completed
MISP completed

Great job everybody! We are done with this short, and theory heavy room. I think the scenario in the end really showed the value of the MISP platform. I am sure we will cover more another day.

In the meanwhile, come back soon for more walkthroughs of rooms on TryHackMe and HackTheBox.


Like my articles?

You are welcome to comment on this article, and please share with friends.
I would be even more grateful if you support me by buying me a cup of coffee:

Buy me a coffee
Buy me a coffee

I learned a lot through HackTheBox’s Academy. If you want to sign up, you can get extra cubes, and support me in the process, if you use the following link:

https://referral.hackthebox.com/mzwwXlg

Newsletter Updates

Enter your email address below and subscribe to our newsletter

Leave a Reply

Your email address will not be published. Required fields are marked *