AbbySec

My digital playground โ€“ where hacking meets learning.

View on GitHub
18 March 2026

SOC138 โ€“ Suspicious XLSM File Detected (Malicious Macro-Based Infection)

by

๐Ÿง  Summary

This investigation was triggered by a SOC138 โ€“ Detected Suspicious XLS File alert involving a macro-enabled Excel document (ORDER SHEET & SPEC.xlsm).

Threat intelligence confirmed that the file contains heavily obfuscated macros designed to execute malicious code. Behavioral indicators suggest exploitation techniques and payload execution.

Network logs further revealed suspicious outbound communication, confirming that the file was actively used in a malware infection scenario.

The affected host was immediately contained.


๐Ÿšจ Alert Overview


๐Ÿ–ฅ๏ธ Endpoint Information


๐Ÿ” File Analysis

๐Ÿ”Ž VirusTotal Results

VirusTotal Detection

Result Value
Detection Ratio 48 / 66
Verdict Malicious

๐Ÿงฌ File Characteristics

๐Ÿง  Analysis


๐ŸŒ Network Analysis

Attribute Value
Source IP 172.16.17.56
Destination IP 177.53.143.89
Port 443
Protocol HTTPS

๐Ÿง  Analysis


๐Ÿ“Š Log Analysis

๐Ÿ“„ Raw Log Insight

Log Result

๐Ÿง  Interpretation

๐Ÿ›ก๏ธ Affected Host Contained

Host Contained


๐Ÿ“Š Behavioral Indicators

Indicator Status
Malicious File Detected โœ… Confirmed
Macro Execution โœ… Confirmed
Obfuscation โœ… Present
Exploit Usage โœ… Suspected (CVE-2017-11882)
External Communication โœ… Confirmed
Host Compromise โœ… Confirmed

๐Ÿงพ Investigation Steps

  1. Reviewed alert details and suspicious XLSM file
  2. Checked file hash in VirusTotal
  3. Confirmed high detection ratio (48/66)
  4. Analyzed macro behavior and obfuscation
  5. Identified exploit-related indicators
  6. Investigated firewall/network logs
  7. Detected suspicious outbound communication
  8. Analyzed raw log data (encoded payload)
  9. Contained the affected host

๐Ÿšจ Incident Response Actions


๐Ÿงฌ MITRE ATT&CK Mapping

Tactic Technique Description
Initial Access T1566.001 โ€“ Phishing Attachment Malicious Excel file delivery
Execution T1204.002 โ€“ User Execution User opened XLSM file
Execution T1059.005 โ€“ Command Execution via Macros Macro execution
Exploitation T1203 โ€“ Exploitation for Client Execution CVE-2017-11882
Defense Evasion T1027 โ€“ Obfuscated Files Obfuscated macro code
Command & Control T1071.001 โ€“ Web Protocols HTTPS communication
Impact T1105 โ€“ Ingress Tool Transfer Payload delivery

๐Ÿ“Œ Final Verdict

Category Result
Malware Presence Confirmed
File Type Malicious XLSM (Macro-based)
Infection Method Macro Execution
Exploit Involvement Likely (CVE-2017-11882)
Command & Control Suspected
Host Compromise Confirmed
Alert Classification True Positive
Incident Severity High

๐Ÿ Conclusion

This alert represents a confirmed macro-based malware infection delivered via an Excel document.

The file utilized:

Network activity confirmed communication with an external system, indicating potential command-and-control interaction or payload delivery.

Immediate containment was required to prevent:


tags: