AbbySec

My digital playground โ€“ where hacking meets learning.

View on GitHub
25 March 2026

SOC137 โ€“ Malicious File/Script Download Attempt (Macro-Based DOCM Blocked)

by

๐Ÿง  Summary

This investigation was triggered by a SOC137 โ€“ Malicious File/Script Download Attempt alert involving a suspicious Microsoft Word macro-enabled document named:

INVOICE PACKAGE LINK TO DOWNLOAD.docm

Initial threat intelligence analysis using VirusTotal showed a high detection rate (38/66), indicating strong evidence of malicious activity.

Further analysis using Hybrid Analysis sandbox confirmed that the document contains malicious VBA macros, specifically an AutoOpen function designed to execute automatically when the file is opened.

The macro leverages PowerShell commands to download additional payloads from a remote server, a common technique used in malware delivery.

However, endpoint telemetry confirmed that the file was blocked at the security control level, and no execution or follow-up activity was observed.

The alert was classified as a True Positive โ€“ Blocked (No Impact).


๐Ÿšจ Alert Overview


๐Ÿ” Investigation Steps

1. VirusTotal Analysis

VirusTotal Detection

๐Ÿ’ก Insight:
The document contains a macro that automatically executes on open and uses PowerShell to download additional payloads โ€” a strong indicator of malware delivery.


2. Code Behavior Insights

โš ๏ธ This is a classic malicious macro technique used in phishing campaigns.


3. Hybrid Analysis Sandbox

Hybrid Analysis Result


4. Endpoint Investigation

All endpoint telemetry was reviewed:

Artifact Checked Result
Process Activity No suspicious execution
Network Connections No outbound C2 traffic
Command Line Activity No PowerShell execution
Browser History No related activity
File Execution Not executed

5. Security Control Validation

โœ” No signs of:


๐Ÿงช Indicators of Compromise (IOCs)


๐Ÿงฌ MITRE ATT&CK Mapping

Tactic Technique
Initial Access T1566.001 โ€“ Phishing Attachment
Execution T1204.002 โ€“ User Execution
Execution T1059.001 โ€“ PowerShell
Defense Evasion T1497 โ€“ Sandbox Evasion
Command & Control T1105 โ€“ Ingress Tool Transfer

๐Ÿ“Š Final Verdict

Category Result
Classification True Positive
Impact No Impact (Blocked)
Threat Level Medium
Action Taken Prevented by security control

โœ… Conclusion

This case represents a phishing-based malware delivery attempt using VBA macros.

The attack chain was successfully interrupted at the initial stage, demonstrating effective security controls.

The system remains uncompromised, and no further remediation is required.


tags: