Skip to main content
Skip table of contents

Investigating Domains using Dossier (2808)


Scenario

Your SOC team has asked you to investigate domains recently connected to abnormal behaviour. Threat Defense security policies identified and blocked the risk. Your task is to use Dossier to collect as much information about these malicious domains as possible and report your findings.

Estimated Completion Time

  • 15 to 20 Minutes

Prerequisites

  • Administrative access to the Infoblox Portal


Tasks

  • Investigate threats with Dossier.

Task 1: Investigating threats with Dossier

  • Log into your lab’s jump-desktop, with the credentials training / infoblox, and use your Education Infoblox Portal Credentials to log into the Infoblox Portal.

  • Investigate the domains: eicar.co, primarkegyptstore.com, and adobekr.com

  • Gather as much information about each domain to answer the following questions:

    • What is the risk level for each domain?

    • What is the threat property for each domain?

    • Were any of the domains detected by Feeds? If so, list the feeds.

    • Are any of the listed domains still active?

    • Are there any impacted devices in your organization?

    • Are there any Intel publications about any of the listed domains?

    • Are there any IPs or domains related to any of the suspicious domains?

    • Where are these domains registered and hosted?

    • Are any of the listed domains connected to domain impersonation?

  • Generate a report from Dossier with all your findings.


Solutions

Task 1 Solution: Investigating threats with Dossier

Please note that your report data might not exactly match the screenshots and answers provided

In this task, we will use Infoblox Dossier to collect information about the three discovered malicious domains and answer the questions.

  1. Log in to your lab’s jump-desktop with the credentials training / infoblox.

  2. Use your Education Infoblox Portal Credentials to log into the Infoblox Portal.

  3. Navigate to Monitor → Research → Dossier.

    • We will be investigating three domains:

      1. eicar.co

      2. primarkegyptstore.com

      3. adobekr.com

  4. In the Search bar, type the name of each domain, then hit Enter.

  5. Gather as much information about each domain to answer the following questions:

    • What is the threat level for each domain if available?

      • This information is found in the summary report under the Detection History Timeline section for each domain.

      • eicar.co → unavailable, primarkegyptstore.com → 100/100, adobekr.com → 80/100.

        image-20241104-134942.png
    • What is the threat property for each domain?

      • This information is found in the summary report under the Infoblox Threat Intel section for each domain.

      • eicar.co → MaliciousNameserver_Generic, primarkegyptstore.com → Phishing_lookalike , adobekr.com → APT_MalwareC2.

        image-20241104-135108.png
    • Were any of the domains detected by Feeds? If so, list the feeds.

      • Each domain’s summary report under the Active Threat Feeds and Status section contains this information.

      • All three were detected: Infoblox-base, Infoblox Malicious Detections, and Suspicious-lookalikes.

        image-20241104-135216.png
    • Are any of the listed domains still active?

      • This information is found at the top banner next to the domain name and the last detection date.

      • Yes, all three are still active.

        image-20241104-134109.png
    • Are there any impacted devices in your organization?

      • We can find this information under the Impacted Devices report and by investigating security policy configurations, under Configure → Security → Policies → Security Policies.

      • No, multiple devices sent queries, but your organization’s threat policy using the recommended feeds blocked those attempts.

        image-20241104-134559.png
    • Are there any related IPs or domains related to suspicious domains?

      • This information is available under the Related IPs and Related Domains reports.

      • Yes, all three domains had either Liked IPs or Domains.

        image-20241104-134437.png
    • Where are these domains registered and hosted?

      • This information is available under the Registered Owner section on the summary and WHOIS Record reports.

      • eicar.co → Iceland, primarkegyptstore.com → Registered in France but Hosted in Canada, adobe.kr→ USA.

        image-20241104-134315.png
        image-20241104-134846.png
    • Are any of the listed domains connected to domain impersonation?

      • This information will be available under the Lookalike Detection section in the summary report.

      • Yes, adobekr.com.

        image-20241104-134008.png
  6. Click on the Export Dossier Report Button at the top left corner. Choose which reports to include, then click the Export button to create a PDF report.

    image-20241104-135728.png
    image-20241104-135741.png
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.