SOC109 โ Emotet Malware Detected (Malicious Word Document Infection)
by
๐ง Summary
This investigation was triggered by a SOC109 โ Emotet Malware Detected alert involving a malicious Microsoft Word document (1word.doc).
Threat intelligence analysis confirmed that the file contains malicious macros associated with Emotet malware. The document was designed to execute hidden code upon opening and establish further malicious activity.
The affected host was immediately contained to prevent further spread.
๐จ Alert Overview
- Event ID: 85
- Rule: SOC109 โ Emotet Malware Detected
- Severity: Medium
- Source Host: RichardPRD
- Source IP: 172.16.17.45
- User: Richard
- File Name: 1word.doc
- File Hash (SHA256):
d34849e1c97f9e615b3a9b800ca1f11ed04a92b1014f55aa0158e3fffc22d78f - File Size: 188.95 KB
- Action: Cleaned
๐ฅ๏ธ Endpoint Information
- Hostname: Rosa
- Operating System: Windows 10 (64-bit)
- Domain: LetsDefend
- Primary User: Rosa
- Containment Status: โ Contained
๐ File Analysis
๐ VirusTotal Results

๐ฅ๏ธ Contacted C2 Addresses

| Result | Value |
|---|---|
| Detection Ratio | 50 / 63 |
| Verdict | Malicious |
๐งฌ File Characteristics
- File Type: Microsoft Word Document (.doc)
- Behavior Tags:
- macros
- obfuscated
- auto-open execution
- WMI calls
- hidden execution
๐ง Analysis
- High detection ratio confirms known malware sample
- Presence of macros โ common Emotet delivery method
- Auto-execution behavior โ indicates initial execution trigger
๐ Network Analysis
๐ฆน Contacted Host Analysis

๐ต๐ฝโโ๏ธ Log Result

| Attribute | Value |
|---|---|
| Destination IP | 209.197.3.8 |
| Port | 80 |
| Request URL | vip0x008.map2.ssl.hwcdn.net |
| Process | Patch.exe |
๐ก๏ธ Contained Affected Host

๐ง Analysis
- Suspicious outbound connection after infection
- Use of unusual domain structure โ possible C2 or payload staging
- Process
Patch.exeโ not standard Windows process โ highly suspicious
๐ Behavioral Indicators
| Indicator | Status |
|---|---|
| Malicious File Detected | โ Confirmed |
| Macro Execution | โ Confirmed |
| Suspicious Process | โ Patch.exe |
| External Communication | โ Confirmed |
| Known Malware Family | โ Emotet |
| Host Compromise | โ Confirmed |
๐งพ Investigation Steps
- Reviewed alert metadata and file details
- Identified suspicious Word document (
1word.doc) - Analyzed file hash using VirusTotal
- Confirmed high-confidence malware detection (50/63)
- Identified macro-based execution behavior
- Investigated network logs for suspicious connections
- Observed outbound traffic to suspicious domain/IP
- Confirmed malicious process execution (
Patch.exe) - Contained the affected host
๐จ Incident Response Actions
- โ Host isolated / contained
- โ Malicious file identified
- โ Threat intelligence correlation completed
- โ Network indicators identified
- โ Logs preserved for further analysis
๐ Final Verdict
| Category | Result |
|---|---|
| Malware Presence | Confirmed |
| Malware Family | Emotet |
| Infection Vector | Malicious Word Document (Macro) |
| Command & Control | Suspected |
| Host Compromise | Confirmed |
| Alert Classification | True Positive |
| Incident Severity | High |
๐งฌ MITRE ATT&CK Mapping
| Tactic | Technique | Description |
|---|---|---|
| Initial Access | T1566.001 โ Phishing Attachment | Malicious Word document delivery |
| Execution | T1204.002 โ User Execution | User opened document |
| Execution | T1059.005 โ Command Shell (via macros) | Macro execution |
| Persistence | T1547 โ Boot or Logon Autostart | Potential persistence |
| Command & Control | T1071.001 โ Web Protocols | HTTP communication |
| Defense Evasion | T1027 โ Obfuscated Files | Obfuscated macros |
| Impact | T1105 โ Ingress Tool Transfer | Payload download |
๐ Conclusion
This alert represents a confirmed Emotet malware infection delivered via a malicious Word document.
The document leveraged macro-based execution techniques to initiate malicious activity upon opening.
Subsequent behavior included:
- Execution of suspicious processes
- Communication with external infrastructure
- Potential payload delivery
Immediate containment was necessary to prevent:
- Lateral movement
- Credential theft
- Further malware deployment
tags: