AbbySec

My digital playground โ€“ where hacking meets learning.

View on GitHub
18 March 2026

SOC109 โ€“ Emotet Malware Detected (Malicious Word Document Infection)

by

๐Ÿง  Summary

This investigation was triggered by a SOC109 โ€“ Emotet Malware Detected alert involving a malicious Microsoft Word document (1word.doc).

Threat intelligence analysis confirmed that the file contains malicious macros associated with Emotet malware. The document was designed to execute hidden code upon opening and establish further malicious activity.

The affected host was immediately contained to prevent further spread.


๐Ÿšจ Alert Overview


๐Ÿ–ฅ๏ธ Endpoint Information


๐Ÿ” File Analysis

๐Ÿ”Ž VirusTotal Results

VirusTotal Detection

๐Ÿ–ฅ๏ธ Contacted C2 Addresses

Contacted C2 Addresses

Result Value
Detection Ratio 50 / 63
Verdict Malicious

๐Ÿงฌ File Characteristics

๐Ÿง  Analysis


๐ŸŒ Network Analysis

๐Ÿฆน Contacted Host Analysis

Contacted Host

๐Ÿ•ต๐Ÿฝโ€โ™‚๏ธ Log Result

Log Result

Attribute Value
Destination IP 209.197.3.8
Port 80
Request URL vip0x008.map2.ssl.hwcdn.net
Process Patch.exe

๐Ÿ›ก๏ธ Contained Affected Host

Contained Host

๐Ÿง  Analysis


๐Ÿ“Š Behavioral Indicators

Indicator Status
Malicious File Detected โœ… Confirmed
Macro Execution โœ… Confirmed
Suspicious Process โœ… Patch.exe
External Communication โœ… Confirmed
Known Malware Family โœ… Emotet
Host Compromise โœ… Confirmed

๐Ÿงพ Investigation Steps

  1. Reviewed alert metadata and file details
  2. Identified suspicious Word document (1word.doc)
  3. Analyzed file hash using VirusTotal
  4. Confirmed high-confidence malware detection (50/63)
  5. Identified macro-based execution behavior
  6. Investigated network logs for suspicious connections
  7. Observed outbound traffic to suspicious domain/IP
  8. Confirmed malicious process execution (Patch.exe)
  9. Contained the affected host

๐Ÿšจ Incident Response Actions


๐Ÿ“Œ Final Verdict

Category Result
Malware Presence Confirmed
Malware Family Emotet
Infection Vector Malicious Word Document (Macro)
Command & Control Suspected
Host Compromise Confirmed
Alert Classification True Positive
Incident Severity High

๐Ÿงฌ MITRE ATT&CK Mapping

Tactic Technique Description
Initial Access T1566.001 โ€“ Phishing Attachment Malicious Word document delivery
Execution T1204.002 โ€“ User Execution User opened document
Execution T1059.005 โ€“ Command Shell (via macros) Macro execution
Persistence T1547 โ€“ Boot or Logon Autostart Potential persistence
Command & Control T1071.001 โ€“ Web Protocols HTTP communication
Defense Evasion T1027 โ€“ Obfuscated Files Obfuscated macros
Impact T1105 โ€“ Ingress Tool Transfer Payload download

๐Ÿ Conclusion

This alert represents a confirmed Emotet malware infection delivered via a malicious Word document.

The document leveraged macro-based execution techniques to initiate malicious activity upon opening.

Subsequent behavior included:

Immediate containment was necessary to prevent:


tags: