{"id":7250,"date":"2024-03-12T07:20:38","date_gmt":"2024-03-12T07:20:38","guid":{"rendered":"\/cybersecurity-blog\/?p=7250"},"modified":"2024-03-12T13:55:28","modified_gmt":"2024-03-12T13:55:28","slug":"monikerlink-sandbox-analysis","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/","title":{"rendered":"How to Set Up a Network Research Laboratory: MonikerLink (CVE-2024-21413) Case Study\u00a0"},"content":{"rendered":"\n<p>Every now and then, you come across a situation where you need to get hands-on to understand how an exploit or malware works and then create a detection rule. Plus, there are times when it&#8217;s essential for the attacking machine to be on the local network to capture network traffic or utilize its own detection tools.&nbsp;<\/p>\n\n\n\n<p>In this article, we&#8217;ll show you how to set up a working environment to gather IOCs and write detection rules, using <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2024-21413\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><strong>CVE-2024-21413<\/strong><\/a><strong> <\/strong>as an example. We&#8217;ll walk you through integrating the ANY.RUN virtual machine into a local VPN network for this purpose. To do this, we&#8217;ll:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>Let&#8217;s quickly analyze the CVE and prepare a Proof of Concept (PoC).&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Set up a local VPN network with the ANY.RUN machine.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>Verify the functionality of the PoC and gather NTLM Hash using Impacket.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Gather IoCs and draft a detection rule.&nbsp;<\/li>\n<\/ol>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nSign up for <span class=\"highlight\">ANY.RUN<\/span> to follow along with the investigation&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/#register\/\" rel=\"noopener\" target=\"_blank\">\nSet up free account\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Description of CVE-2024-21413 and Preparing a PoC&nbsp;<\/h2>\n\n\n\n<p>&nbsp;This Outlook vulnerability can lead to the leakage of an NTLM Hash, potentially enabling the execution of arbitrary code without alerting the user.&nbsp;<\/p>\n\n\n\n<p>In essence, when the victim clicks on a link within an email, a file is downloaded from a remote server and executed without any warning prompt. Additionally, during the file&#8217;s execution, there&#8217;s an attempt to authenticate against the remote server via the SMB protocol, resulting in an NTLM Hash leak.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"394\" height=\"207\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/01.png\" alt=\"\" class=\"wp-image-7252\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/01.png 394w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/01-300x158.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/01-370x194.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/01-270x142.png 270w\" sizes=\"(max-width: 394px) 100vw, 394px\" \/><\/figure><\/div>\n\n\n<p>One telltale sign of a malicious link is the presence of an exclamation mark at the end of the file URL, enabling it to bypass security mechanisms. With this in mind, let&#8217;s draft a sample email to illustrate how to circumvent Outlook&#8217;s protection mechanism:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"439\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-3-1024x439.png\" alt=\"\" class=\"wp-image-7251\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-3-1024x439.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-3-300x129.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-3-768x329.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-3-370x159.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-3-270x116.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-3-740x317.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/1-3.png 1274w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Note the exclamation mark (\u201c!\u201d)<\/figcaption><\/figure><\/div>\n\n\n<p>As depicted in the screenshot above, we appended an exclamation mark to the end of the link and followed it with random text. We designated the attacker&#8217;s server as the IP address. In our scenario, this server is a machine on the local network running Kali Linux, which we&#8217;ll integrate shortly.&nbsp;<\/p>\n\n\n\n<p>For a comprehensive demonstration, we also require a document file that, upon opening, triggers the execution of a program, such as &#8220;winver.exe&#8221; from the System32 directory. You can obtain the RTF file from <a href=\"https:\/\/app.any.run\/tasks\/b7083195-cfc4-4e5f-9eb2-8566c832468d\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=monikerlink_analysis&amp;utm_content=linktoservice&amp;utm_term=120324\" target=\"_blank\" rel=\"noreferrer noopener\">this link<\/a> \u2014 it leverages CVE-2017-11882 to launch an arbitrary application:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"657\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-3-1024x657.png\" alt=\"\" class=\"wp-image-7253\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-3-1024x657.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-3-300x193.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-3-768x493.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-3-370x238.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-3-270x173.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-3-740x475.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/2-3.png 1274w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Example of CVE-2017-11882 exploitation<\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Integrating of ANY.RUN into a local VPN network\u00a0<\/h2>\n\n\n\n<p>In order to integrate into the local network, we require a functional OpenVPN server, which will double as the attacker\u2019s host. It&#8217;s crucial to exercise caution as malware could potentially gain access to this server. Setting up a VPN server is a detailed process that warrants its own article, hence it&#8217;s beyond the scope of this discussion.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"718\" height=\"216\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/02.png\" alt=\"\" class=\"wp-image-7254\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/02.png 718w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/02-300x90.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/02-370x111.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/02-270x81.png 270w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><figcaption class=\"wp-element-caption\">IP address of our local VPN server&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>To ensure the stable operation of the internet connection, it&#8217;s important not to overlook configuring keep-alive packets in the OpenVPN server configuration file.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"458\" height=\"177\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/03.png\" alt=\"\" class=\"wp-image-7255\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/03.png 458w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/03-300x116.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/03-370x143.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/03-270x104.png 270w\" sizes=\"(max-width: 458px) 100vw, 458px\" \/><figcaption class=\"wp-element-caption\">Part of the OpenVPN configuration file with keep-alive option&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Next, we&#8217;ll need a client configuration file, known as &#8220;OVPN&#8221;, which will be utilized to establish the connection of the virtual machine to the network when initiating the task.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"454\" height=\"384\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/04.png\" alt=\"\" class=\"wp-image-7256\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/04.png 454w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/04-300x254.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/04-370x313.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/04-270x228.png 270w\" sizes=\"(max-width: 454px) 100vw, 454px\" \/><figcaption class=\"wp-element-caption\">Part of the configuration file OVPN clientOpenVPN with keep-alive option<\/figcaption><\/figure><\/div>\n\n\n<p>Navigate to your profile and access the &#8220;Custom OpenVPN configs&#8221; tab to upload the OVPN client file.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"501\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/3-1-1024x501.png\" alt=\"\" class=\"wp-image-7258\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/3-1-1024x501.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/3-1-300x147.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/3-1-768x376.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/3-1-1536x752.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/3-1-370x181.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/3-1-270x132.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/3-1-740x362.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/3-1.png 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Addia new client configuration to connect to OpenVPN<\/figcaption><\/figure><\/div>\n\n\n<p>Create a new task, upload the sample, select our VPN configuration and run the task:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"488\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/4-1024x488.png\" alt=\"\" class=\"wp-image-7257\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/4-1024x488.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/4-300x143.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/4-768x366.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/4-1536x732.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/4-370x176.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/4-270x129.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/4-740x353.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/4.png 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Upload User VPN configuration in the task<\/figcaption><\/figure><\/div>\n\n\n<p>As we remember, the IP address of our VPN server is \u201c10.2.0.1\u201d. Let&#8217;s check if it&#8217;s accessible using the \u201cping\u201d utility in ANY.RUN\u2019s virtual machine:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"460\" height=\"184\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/05.png\" alt=\"\" class=\"wp-image-7259\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/05.png 460w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/05-300x120.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/05-370x148.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/05-270x108.png 270w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><\/figure><\/div>\n\n\n<p>Seeing the responses from the OpenVPN server confirms that the ANY.RUN virtual machine has successfully connected to the local network.&nbsp;<\/p>\n\n\n\n<p>With that, the network connection setup is finished.&nbsp;&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nIntegrate <span class=\"highlight\">ANY.RUN<\/span> in your organization&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/contact-us\/\" rel=\"noopener\" target=\"_blank\">\nContact Sales\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Verifying PoC and Collecting NTLM Hashes\u00a0<\/h2>\n\n\n\n<p>CVE-2024-21413 utilizes the SMB protocol to fetch a remote file, thus requiring an SMB server capable of not only serving the required files but also storing NTLM hashes. For this purpose, we&#8217;ll employ the SmbServer from the Impacket package as our server.&nbsp;<\/p>\n\n\n\n<p>First and foremost, let&#8217;s set up a directory containing an &#8220;rtf&#8221; file. (For sourcing the file, refer to the instructions above):&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"96\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/06-1024x96.png\" alt=\"\" class=\"wp-image-7260\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/06-1024x96.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/06-300x28.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/06-768x72.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/06-370x35.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/06-270x25.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/06-740x69.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/06.png 1102w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Shared SMB directory on the attacker&#8217;s server<\/figcaption><\/figure><\/div>\n\n\n<p>Next, let\u2019s run impacket-smbserver:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"801\" height=\"189\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/07.png\" alt=\"\" class=\"wp-image-7261\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/07.png 801w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/07-300x71.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/07-768x181.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/07-370x87.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/07-270x64.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/07-740x175.png 740w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><figcaption class=\"wp-element-caption\">Launching an SMB server on the attacker&#8217;s machine<\/figcaption><\/figure><\/div>\n\n\n<p>We&#8217;re now ready to click on the link within the generated email. Head over to AnyRun and select &#8220;Malicious Link&#8221;.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"344\" height=\"237\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/08.png\" alt=\"\" class=\"wp-image-7262\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/08.png 344w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/08-300x207.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/08-270x186.png 270w\" sizes=\"(max-width: 344px) 100vw, 344px\" \/><\/figure><\/div>\n\n\n<p>After a brief wait, we notice that &#8220;winver.exe&#8221; has surfaced in the processes, and the &#8220;About Windows&#8221; window has popped up on the screen, all without any warning window from Outlook despite the error.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"752\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/5-1-1024x752.png\" alt=\"\" class=\"wp-image-7263\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/5-1-1024x752.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/5-1-300x220.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/5-1-768x564.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/5-1-370x272.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/5-1-270x198.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/5-1-740x544.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/5-1-80x60.png 80w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/5-1.png 1274w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">A process graph displayed in ANY.RUN <\/figcaption><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"529\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/6-1-1024x529.png\" alt=\"\" class=\"wp-image-7264\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/6-1-1024x529.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/6-1-300x155.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/6-1-768x397.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/6-1-1536x794.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/6-1-370x191.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/6-1-270x140.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/6-1-740x382.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/6-1.png 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">There\u2019s a pop-up window and an error, but the code was executed&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Now, let&#8217;s navigate back to the server console and confirm that we have successfully collected an NTLM hash. This hash can be subsequently subjected to brute force attacks using utilities such as HashCat or John The Ripper.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"319\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/09-1024x319.png\" alt=\"\" class=\"wp-image-7265\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/09-1024x319.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/09-300x93.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/09-768x239.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/09-370x115.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/09-270x84.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/09-740x230.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/09.png 1167w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Server<\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Collecting IOCs and writing a signature\u00a0<\/h2>\n\n\n\n<p>From the blue team&#8217;s perspective, the main task is to collect IOCs and develop detection rules.&nbsp;<\/p>\n\n\n\n<p>One effective approach is to leverage ANY.RUN\u2019s detection mechanism, which has already flagged numerous malicious activities, including the exploitation of CVE-2017-11882, along with various signatures, and more.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"613\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/10-1024x613.png\" alt=\"\" class=\"wp-image-7266\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/10-1024x613.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/10-300x179.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/10-768x459.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/10-370x221.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/10-270x162.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/10-740x443.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/10.png 1100w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">ANY.RUN indicates malicious activities related to the vulnerability exploitation <\/figcaption><\/figure><\/div>\n\n\n<p>Also, in the Network Threats tab, we observe the detection of the &#8220;Impacket SMB Server&#8221; that we utilized. Interestingly, this server is frequently employed in other attacks as well. (Read <a href=\"https:\/\/x.com\/anyrun_app\/status\/1760284876832473377?s=20\" target=\"_blank\" rel=\"noreferrer noopener\">our tweet<\/a> for reference).&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nDetect threats with useful tags and access triggered Suricata Rules in <span class=\"highlight\">ANY.RUN<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/#register\/\" rel=\"noopener\" target=\"_blank\">\nSign up for free\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"776\" height=\"73\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/11.png\" alt=\"\" class=\"wp-image-7267\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/11.png 776w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/11-300x28.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/11-768x72.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/11-370x35.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/11-270x25.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/03\/11-740x70.png 740w\" sizes=\"(max-width: 776px) 100vw, 776px\" \/><figcaption class=\"wp-element-caption\">Suricata rules triggered<\/figcaption><\/figure><\/div>\n\n\n<p>However, we can also write another signature to detect potential leakage of NTLM hashes to an external network.&nbsp;<\/p>\n\n\n\n<p>The following rule tracks potential authentication data leakage via the NTLM protocol, which violates local network security policies:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>alert smb any any -&gt; $EXTERNAL_NET any (msg: \"POLICY &#91;ANY.RUN] Possible NTLM Hash leak over SMB to External Network (NTLMSSP_AUTH)\"; \nflow: established, to_server; \ncontent: \"SMB\"; offset: 5; depth: 3; \ncontent: \"NTLMSSP|00 03 00 00 00|\"; distance: 0; \nsid: 8001383; rev: 1;) <\/code><\/pre>\n\n\n\n<p>This rule has three main conditions:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>It detects SMB traffic.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>It looks for access to the external network.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>It checks for the presence of the NTLM identifier and authentication in the message type within the packet.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Summary and attack prevention\u00a0<\/h2>\n\n\n\n<p>The best practice is to keep software updated promptly and to <em>block any outgoing SMB traffic<\/em> to external networks. By doing so, this type of attack would be thwarted as it would be impossible to reach the attacker&#8217;s server.&nbsp;<\/p>\n\n\n\n<p>In summary, we have explored how to integrate ANY.RUN into a local network and remotely monitor threats using ANY.RUN.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About ANY.RUN<\/strong><\/h2>\n\n\n\n<p>ANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for security teams. Every day, 400,000 professionals use our platform to investigate incidents and streamline threat analysis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Advantages of ANY.RUN<\/strong>&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Real-time detection<\/strong>: Within roughly 40 seconds of uploading a file, ANY.RUN can detect malware and automatically identify many malware families using YARA and Suricata rules.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Interactive analysis:<\/strong> Unlike many automated solutions, ANY.RUN allows you to interactively engage with the virtual machine directly through your browser. This interactive capability helps prevent zero-day exploits and sophisticated malware that can evade signature-based detection.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cost-Effective<\/strong>: For businesses, ANY.RUN\u2019s cloud nature translates into a cost-effective solution, as it doesn&#8217;t require any setup or maintenance effort from your DevOps team.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Great for onboarding new security team members<\/strong>: ANY.RUN&#8217;s intuitive interface allows even junior SOC analysts to quickly learn how to analyze malware and extract indicators of compromise IOCs.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/#register\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=monikerlink_analysis&amp;utm_content=linktoregistration&amp;utm_term=120324\" target=\"_blank\" rel=\"noreferrer noopener\">Try our sandbox with a free account \u2192&nbsp;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every now and then, you come across a situation where you need to get hands-on to understand how an exploit or malware works and then create a detection rule. Plus, there are times when it&#8217;s essential for the attacking machine to be on the local network to capture network traffic or utilize its own detection [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":7270,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,34,40],"class_list":["post-7250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Analyzing CVE-2024-21413 in a Malware Sandbox\u00a0<\/title>\n<meta name=\"description\" content=\"See how to set up a working environment in a sandbox to gather IOCs and write detection rules, using CVE-2024-21413 as an example.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Electron, khr0x and Jane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/\"},\"author\":{\"name\":\"Electron, khr0x and Jane\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"How to Set Up a Network Research Laboratory: MonikerLink (CVE-2024-21413) Case Study\u00a0\",\"datePublished\":\"2024-03-12T07:20:38+00:00\",\"dateModified\":\"2024-03-12T13:55:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/\"},\"wordCount\":1351,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/\",\"name\":\"Analyzing CVE-2024-21413 in a Malware Sandbox\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-03-12T07:20:38+00:00\",\"dateModified\":\"2024-03-12T13:55:28+00:00\",\"description\":\"See how to set up a working environment in a sandbox to gather IOCs and write detection rules, using CVE-2024-21413 as an example.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Set Up a Network Research Laboratory: MonikerLink (CVE-2024-21413) Case Study\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},[{\"@type\":[\"Person\"],\"@id\":\"https:\/\/any.run\/\",\"name\":\"Electron\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/any.run\/\",\"inLanguage\":\"en_US\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/6394744-150x150.png\",\"caption\":\"Electron\"}},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/any.run\/\",\"name\":\"khr0x\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/any.run\/\",\"inLanguage\":\"en_US\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/ghIpC7Xf4_I-1-150x150.jpg\",\"caption\":\"khr0x\"}},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/any.run\/\",\"name\":\"Jane\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/any.run\/\",\"inLanguage\":\"en_US\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/Jane-150x150.jpg\",\"caption\":\"Jane\"}}]]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analyzing CVE-2024-21413 in a Malware Sandbox\u00a0","description":"See how to set up a working environment in a sandbox to gather IOCs and write detection rules, using CVE-2024-21413 as an example.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/","twitter_misc":{"Written by":"Electron, khr0x and Jane","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/"},"author":{"name":"Electron, khr0x and Jane","@id":"https:\/\/any.run\/"},"headline":"How to Set Up a Network Research Laboratory: MonikerLink (CVE-2024-21413) Case Study\u00a0","datePublished":"2024-03-12T07:20:38+00:00","dateModified":"2024-03-12T13:55:28+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/"},"wordCount":1351,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/","url":"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/","name":"Analyzing CVE-2024-21413 in a Malware Sandbox\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-03-12T07:20:38+00:00","dateModified":"2024-03-12T13:55:28+00:00","description":"See how to set up a working environment in a sandbox to gather IOCs and write detection rules, using CVE-2024-21413 as an example.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"How to Set Up a Network Research Laboratory: MonikerLink (CVE-2024-21413) Case Study\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},[{"@type":["Person"],"@id":"https:\/\/any.run\/","name":"Electron","image":{"@type":"ImageObject","@id":"https:\/\/any.run\/","inLanguage":"en_US","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/6394744-150x150.png","caption":"Electron"}},{"@type":["Person"],"@id":"https:\/\/any.run\/","name":"khr0x","image":{"@type":"ImageObject","@id":"https:\/\/any.run\/","inLanguage":"en_US","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/ghIpC7Xf4_I-1-150x150.jpg","caption":"khr0x"}},{"@type":["Person"],"@id":"https:\/\/any.run\/","name":"Jane","image":{"@type":"ImageObject","@id":"https:\/\/any.run\/","inLanguage":"en_US","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/06\/Jane-150x150.jpg","caption":"Jane"}}]]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7250"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=7250"}],"version-history":[{"count":6,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7250\/revisions"}],"predecessor-version":[{"id":7276,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7250\/revisions\/7276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7270"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=7250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=7250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=7250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}