Cybersecurity Project: Epic Games Store Packet Capture - Statistic Analysis

It's time to continue my grind through the data from the Epic Games Store packet capture! Since looking at encrypted packets wasn't providing many real insights, it's time to pivot statistics, courtesy of Wireshark!

Table of Contents

Conversations

Under the Statistics options in Wireshark, Conversations is the fourth option, but possibly the most useful in terms of network flow analysis. The tool generates a table of the source/destination IPs, the total number of packets exchanged between them, the total bytes exchanged in the conversation, how many packets and bytes were exchanged in a specific direction, the relative start time of the conversation, the duration, and what the connection speed was in a specific direction.

You can export this table to a spreadsheet via copying as a CSV, which I did.

Why? Because if you remember earlier in this project, I generated a list of domains and the IPs associated with them. By copying the conversation data into the spreadsheet, I could then add the domains to those conversations, providing even greater context to my analysis.

This allowed me to see any outliers in the data, which weren't apparent when focusing on specific packet captures.

Wireshark Conversations dump in Excel, showing connection properties and associated domains.

Insights

Here are some interesting highlights from the data:

Address AAddress BPacketsBytesPackets A → BBytes A → BPackets B → ABytes B → ARel StartDurationBits/s A → BBits/s B → ADomain
EGS Host23.40.57.31908711 MB1307333 kB778011 MB302.7385399.12126680 bits/s221 kbpse9616.d.akamaiedge.net/static-assets-prod.epicgames.com

For example, we have this connection, which is initially to the domain e9616.d.akamaiedge.net, then executes a client hello that results in a connection to static-assets-prod.epicgames.com. This then results in 11 megabytes of data getting transferred to the EGS Host system. Based on the name of the domain, there's a high probability that this was just a number of images shown in the EGS client, likely thumbnails and banner images.

Address AAddress BPacketsBytesPackets A → BBytes A → BPackets B → ABytes B → ARel StartDurationBits/s A → BBits/s B → ADomain
EGS Host23.205.165.1523887954 MB3108173 kB3577154 MB306.183833.983348 kbps108 Mbpsa1859.w27.akamai.net/epicgames-download1.akamaized.net

Next, we have another connection to an Akamai domain that then hands off to an Epic Games server. It is much less clear what this could be, given the encrypted nature of the contents. The small file size, compared to another EGS download, and the fact that I couldn't download anything through the Unreal Engine store leads me to believe that this might just be an EGS client update.

Address AAddress BPacketsBytesPackets A → BBytes A → BPackets B → ABytes B → ARel StartDurationBits/s A → BBits/s B → ADomain
EGS Host146.75.126.33598444684 MB1494619 MB448983675 MB404.441049273.8069250 kbps19 Mbps 

This is an encrypted connection to fastly-download.epicgames.com, which is hosted on an AmazonS3 server. The 9 megabyte upload is highly suspicious, but the 675 megabyte download is also suspicious. However, if this was the initial EGS install/update, this might make some amount of sense.

(It does raise the question of why do you need over half a gigabyte of data for what's probably a browser. Even factoring in potential game dependencies like DirectX, C++, and .Net frameworks, it's a bit much.)

Address AAddress BPacketsBytesPackets A → BBytes A → BPackets B → ABytes B → ARel StartDurationBits/s A → BBits/s B → ADomain
EGS Host104.18.50.19026065713 GB77987151 MB18267003 GB620.386146216.33531903 kbps102 Mbpscloudflare.epicgamescdn.com.cdn.cloudflare.net

The most suspicious thing about this connection is not that it's moving several gigabytes of data - this is the main connection where Unreal Engine 4.26 was downloaded.

It's the fact that 51 megabytes were sent from my PC to the download server that's concerning. There's no logical reason why so much data would need to move from the client to the server.

However, I do have a possible theory.

Remember how there was a 54MB download from epicgames-download1.akamaized.net? That's close enough in size to the mysterious upload to be suspicious.

There's a possibility that the initial 54MB download was some kind of encapsulated authorization token, which was then decapsulated after download and reuploaded to authorize the download from the Unreal Engine store. Why you would do this is a mystery, because there's likely any number of more efficient methods to accomplish this same goal.

There's also a possibility that there was simply a million 54 byte ACK messages sent by my computer during the process. Unlike most of the other connections, this connection was only HTTP. Which makes sense - if you're going to be pushing tons of files, including many that are already compressed, adding encryption on top is not ideal.

(It does mean that I have nice list of filenames, hashes, and other data for various UE 4.26 components.)

Preliminary Takeaways

With so many of the captured packets being encrypted and lacking a good TLS inspection system to use for another round of packet capture, it's time to put this project to bed.

So, what are my main takeaways?

  • AnyDesk is a good remote desktop solution within the confines of a home network.
  • VirtualBox's lack of GPU pass through limits its utility as a tool for safely testing certain complex software that requires certain hardware features.
  • Sandboxie-Plus could be a good method of testing potentially compromised/suspicious software for home labbers, but too many features require a paid license for it to be a great solution.
  • Epic Games Store/Unreal Engine 4.26 may not behave properly when run in a basic Sandboxie configuration, making testing more difficult.
  • EGS and Unreal Engine only run a handful of limited processes, so there doesn't appear to be any spyware in them, beyond telemetry that can be disabled via settings menus.
  • Epic utilizes TLS for many of its internet connections to various servers, which is exemplary for security, but makes analysis of the actual traffic difficult without more advanced tools.
  • Wireshark's lack of a built-in tool to quickly dump domains and their associated IPs is quite unfortunate, and hurts efforts by end users to help add to community generated domain block lists.
  • In an investigation where you have a packet capture and no specific starting direction, the Conversations statistics generated by Wireshark can help identify IPs with traffic of interest.
  • Once you have a list of domains and their associated IPs, run a Wireshark command prompt command to dump all the IPs captured in the packet, then run some kind of script to obtain all relevant IPs and associate them with the domains.
  • EGS likes using Akamai domains as proxies/hosting for various servers, which does provide a bit of security via obscurity, but also leaves EGS potentially vulnerable to becoming a malware vector if the server is compromised.
  • EGS winds up uploading a large amount of data while downloading files over long periods of time.
  • 54 byte ACK packets can build up over the duration of the connection and lead up to multi-megabyte totals.
  • Wireshark's Conversations statistics tool doesn't provide trend data, just overall totals and averages, which can be a bit misleading at first glance.

Now that this project's wrapped up, I'll be spending time on shorter cybersecurity topics while I prepare for the CompTIA Security+ exam. So keep an eye out for a wild range of topics in the near future!