AbbySec

My digital playground – where hacking meets learning.

View on GitHub
18 March 2026

SOC282 – Phishing Alert Escalated to Malware Execution via ZIP Payload

by

🧠 Summary

This investigation began as a Phishing Alert (SOC282 – Deceptive Mail Detected) triggered by a suspicious email sent to a user.

[!CAUTION] This case escalated from a phishing attempt to a confirmed malware execution incident (host compromise).


🚨 Alert Overview


πŸ“§ Email Analysis

Phishing Email

🚩 Indicators:


πŸ“Ž Attachment Analysis

VirusTotal Result

File Name: free-coffee.zip

🚨 Risk:

🌐 URL & Redirect Analysis

https://download.cyberlearn.academy/...
➑ Redirects to: AWS S3 β†’ free-coffee.zip

🚩 Findings:

πŸ§ͺ VirusTotal Analysis


πŸ’» Endpoint Process Analysis (πŸ”₯ CRITICAL EVIDENCE)

Endpoint Process

πŸ“Œ Findings:

🚨 Malicious Behavior Observed:

Process spawned: cmd.exe

Execution chain:

  1. explorer.exe
  2. ↳ Coffee.exe
  3. ↳ cmd.exe (πŸ”΄ Confirmed Command Execution)

πŸ” Additional Details:


πŸ”— Full Attack Chain

  1. Phishing Email received.
  2. User clicks link / downloads ZIP.
  3. User extracts free-coffee.zip.
  4. User executes Coffee.exe.
  5. Malware spawns cmd.exe.
  6. System Compromise achieved.

🧾 Artifacts Identified

Type Value Description
URL https://download.cyberlearn.academy Malicious redirect URL
IP Address 103.80.134.63 SMTP server
IP Address 172.67.166.172 Hosting infrastructure
IP Address 37.120.233.226 C2 IP Address
IP Address 172.16.20.151 Felix Host IP Address (Affected Host)
File Coffee.exe Malicious payload
Hash CD903AD2...1D334 SHA256 File hash

πŸ“Š Investigation Findings

Category Result
Phishing Email Confirmed
Malicious Attachment Confirmed
Malicious URL Confirmed
File Download Confirmed
File Execution 🚨 Confirmed
Command Execution 🚨 Confirmed
Host Compromise πŸ”΄ Confirmed

πŸ“Œ Final Verdict


πŸ›‘οΈ MITRE ATT&CK Mapping

Tactic ID Technique Description
Initial Access T1566.002 Spearphishing Link Phishing lure containing a malicious link to download.cyberlearn.academy.
Execution T1204.002 User Execution: Malicious File Victim manually downloaded, extracted, and executed Coffee.exe.
Execution T1059.003 Command and Scripting Interpreter: Windows Command Shell Coffee.exe spawned cmd.exe to execute arbitrary commands.
Command & Control T1105 Ingress Tool Transfer Use of AWS S3 and redirect chains to deliver the malicious ZIP payload.
Defense Evasion T1036 Masquerading Use of a β€œFree Coffee” lure and typosquatted domain to appear legitimate.

πŸ›‘ Incident Response Actions

  1. Isolation: Endpoint identified as compromised; immediate isolation recommended.
  2. Process Kill: Malicious process execution confirmed and documented.
  3. IOC Logging: Indicators of Compromise (IOCs) added to blocklist.
  4. Remediation: Full threat eradication and system re-imaging required.

πŸ“ Analyst Notes

The alert was triggered due to a phishing email containing a malicious attachment and embedded download link. The sender domain (coffeeshooop.com) was identified as a typosquatting domain.

Endpoint investigation confirmed that the user downloaded and executed the file (Coffee.exe), which subsequently spawned cmd.exe. This confirms successful malware execution and system compromise. The alert is classified as a True Positive and escalated to Critical severity.

[!ATTENTION] Please type in the analyst note manually, copy pasting this section entirely may result in unable to close this alert.


🏁 Conclusion

This case demonstrates a full attack lifecycle, highlighting the effectiveness of combining social engineering with cloud infrastructure abuse (AWS S3). Immediate response and containment are critical to prevent further lateral movement within the network.

tags: