AbbySec

My digital playground โ€“ where hacking meets learning.

View on GitHub
18 March 2026

SOC104 โ€“ Malware Detected (Invoice.exe Maze Ransomware Infection)

by

๐Ÿง  Summary

This investigation was triggered by a SOC104 โ€“ Malware Detected alert involving a suspicious executable named invoice.exe.

Initial endpoint review showed limited telemetry; however, deeper investigation revealed that the host had accessed a known malicious IP address.

Further threat intelligence analysis confirmed that both the download source (IP) and the file hash were associated with Maze ransomware activity.

The system was immediately contained, and the alert was classified as a True Positive malware infection.


๐Ÿšจ Alert Overview


๐Ÿ–ฅ๏ธ Endpoint Information

Endpoint Info


๐Ÿ” Initial Findings

โš ๏ธ Despite limited visibility, further investigation continued using network and threat intelligence data.


๐ŸŒ Network Analysis

Log Info

Attribute Value
Source IP 10.15.15.18
Destination IP 92.63.8.47
Protocol HTTPS (443)
URL http://92.63.8.47/

๐Ÿง  Analysis


๐ŸŒ Threat Intelligence โ€“ IP Analysis

๐Ÿ”Ž VirusTotal (IP)

VT Result (Link)

Result Value
Detection Ratio 12 / 95
Verdict Malicious

๐Ÿ“Œ Intelligence Insight


๐Ÿงช Threat Intelligence โ€“ File Analysis

๐Ÿ”Ž VirusTotal (File Hash)

VT Result (File Hash)

Result Value
Detection Ratio 65 / 72
Verdict Malicious

๐Ÿงฌ Threat Classification

๐Ÿง  Interpretation


๐Ÿ“Š Behavioral Indicators

Indicator Status
Malicious File Download โœ… Confirmed
Connection to Malicious IP โœ… Confirmed
Known Malware Hash โœ… Confirmed
Endpoint Visibility Limited
Execution Evidence Likely

๐Ÿงพ Investigation Steps

  1. Reviewed alert metadata and file details
  2. Checked endpoint telemetry (process, CLI, browser)
  3. Identified suspicious network connection to external IP
  4. Investigated IP reputation using VirusTotal
  5. Confirmed IP linked to malicious activity
  6. Analyzed file hash in VirusTotal
  7. Confirmed file as Maze ransomware
  8. Correlated network + file indicators
  9. Contained the affected endpoint

๐Ÿšจ Incident Response Actions


๐Ÿงฌ MITRE ATT&CK Mapping

Tactic Technique Description
Initial Access T1189 โ€“ Drive-by Compromise Malicious file downloaded from external IP
Execution T1204.002 โ€“ User Execution User executed invoice.exe
Command & Control T1071.001 โ€“ Web Protocols Communication over HTTP/HTTPS
Command & Control T1105 โ€“ Ingress Tool Transfer Malware downloaded from remote server
Discovery T1082 โ€“ System Information Discovery System info gathered by malware
Defense Evasion T1027 โ€“ Obfuscated Files Possible evasion techniques used
Impact T1486 โ€“ Data Encrypted for Impact Ransomware encryption activity

๐Ÿ“Œ Final Verdict

Category Result
Malware Presence Confirmed
Threat Type Maze Ransomware
Initial Vector Malicious IP Download
Host Compromise Confirmed
Alert Classification True Positive
Incident Severity Critical

๐Ÿ Conclusion

This alert represents a confirmed malware infection involving Maze ransomware.

Although endpoint telemetry was limited, correlation of:

provided sufficient evidence to confirm compromise.

The use of a direct IP-based download further indicates intentional malicious delivery infrastructure.

Immediate containment was required to prevent:


tags: