Post

Lets Defend - SOC Event ID 93

Lets Defend - SOC Event ID 93

SOC146 - Phishing Mail Detected - Excel 4.0 Macros ( This alert was generated from a real phishing attack.)

Security Incident Report

Phishing Email with Malicious Excel 4.0 Macros

Screenshot 2026-04-09 at 7.58.56 PM.png


1. Incident Summary

An alert was triggered for a suspected phishing email containing a malicious attachment using Excel 4.0 macros. These types of macros are commonly abused by attackers to execute malware on a victim’s system.


2. Alert Details

  • Alert Name: SOC146 - Phishing Mail Detected - Excel 4.0 Macros
  • Event ID: 93
  • Date & Time: June 13, 2021, 02:13 PM
  • Severity Level: Security Analyst
  • Device Action: Allowed (Email was successfully delivered)

3. Email Information

Screenshot 2026-04-08 at 8.19.11 PM.png


4. Suspicious Indicators Identified

  • The email contained a password-protected ZIP attachment:
    • File Name: 11f44531fb088d31307d87b01e8eabff.zip.zip
    • Password: infected
  • The Zip file contained 3 files(2 dll{dynamic link library files} and 1 xls file)
  • Password-protected files are commonly used to bypass email security filters.
  • The attachment uses Excel 4.0 (XLM) macros, a known technique for delivering malware.

5. Attachment Analysis

The attachment was analyzed using external sandbox tools.

  • Tools Used:
    • VirusTotal

    Screenshot 2026-04-08 at 8.13.35 PM.png

    Screenshot 2026-04-08 at 8.14.01 PM.png

    • Hybrid Analysis

    Screenshot 2026-04-08 at 8.15.53 PM.png

  • Result:
    • The Three files was confirmed to be malicious.
    • The malware is capable of executing macros and initiating outbound network connections (potential Command-and-Control communication).

6. Email Delivery Status

  • The alert shows “Device Action: Allowed”, confirming that the email was delivered to the user’s mailbox.

7. Log Analysis (Critical Step)

To determine whether the malicious file was executed, network logs were reviewed.

Screenshot 2026-04-08 at 8.21.36 PM.png

Observed Activity:

At 02:20 PM, shortly after email delivery, the following outbound connections were recorded:

  • 172.16.17.57 → 188.213.19.81 (Port 443)
  • 172.16.17.57 → 192.232.219.67 (Port 443)

Analysis:

  • These connections originated from the recipient’s system.
  • The traffic occurred within minutes of receiving the phishing email.
  • The connections were made over HTTPS (port 443), commonly used by malware to hide communication.

Conclusion from Logs:

  • The timing and nature of the connections strongly indicate that the malicious attachment was opened and executed.
  • The external IP addresses are likely associated with Command-and-Control (C2) communication.

8. Incident Assessment

  • Threat Type: Phishing with malicious attachment
  • Attack Vector: Email (ZIP file containing Excel macro malware)
  • User Interaction: Confirmed (File was opened)
  • C2 Communication: Likely observed
  • Impact Level: Medium to High

  • Immediately isolate the affected system (172.16.17.57).
  • Block the identified external IP addresses:
    • 188.213.19.81
    • 192.232.219.67
  • Remove the phishing email from the user’s mailbox.
  • Perform a full malware scan on the affected system.
  • Reset user credentials as a precaution.
  • Investigate for any further lateral movement or persistence.

10. Recommendations for Prevention

  • Disable Excel 4.0 macros across the organization.
  • Block or inspect password-protected attachments.
  • Enhance email filtering policies.
  • Provide phishing awareness training to users.
  • Deploy or strengthen Endpoint Detection and Response (EDR) solutions.

MITRE ATT&CK Mapping

TacticTechnique IDTechnique NameDescription
Initial AccessT1566.001Spearphishing AttachmentMalicious ZIP attachment delivered via phishing email
ExecutionT1204.002User Execution: Malicious FileUser opened the attachment triggering execution
ExecutionT1059.005Command and Scripting Interpreter: Visual Basic (Macros)Excel 4.0 macros used to execute malicious code
Defense EvasionT1027Obfuscated Files or InformationPassword-protected ZIP used to bypass detection
Command & ControlT1071.001Application Layer Protocol: Web ProtocolsOutbound HTTPS communication to external IPs
Command & ControlT1105Ingress Tool Transfer (Potential)Possible download of additional payloads from C2

11. Conclusion

This incident involved a phishing email delivering a malicious Excel 4.0 macro payload. The email successfully reached the user, and subsequent log analysis confirmed that the attachment was opened, leading to suspicious outbound network connections. This indicates a likely system compromise and attempted communication with attacker-controlled infrastructure.


12. Lessons Learned

  • Phishing emails often use evasion techniques:

    Attackers commonly use password-protected ZIP files and Excel 4.0 macros to bypass traditional email security controls.

  • User interaction is a critical risk factor:

    Even when detection systems flag malicious emails, successful delivery combined with user action can lead to compromise.

  • Behavioral analysis is essential:

    Not all threats can be confirmed using static indicators alone. Correlating event timing and network behavior is crucial in identifying malicious activity.

  • Outbound traffic analysis is key to detecting compromise:

    Monitoring unexpected external connections, especially shortly after suspicious events, can reveal malware execution and C2 communication.

  • Defense-in-depth is necessary:

    Relying solely on email filtering is insufficient. Additional controls such as EDR, macro restrictions, and user awareness are essential.


13. Skills Demonstrated

  • Phishing Analysis:

    Identified suspicious characteristics in email metadata, including sender details, subject line, and attachment type.

  • Malware Analysis (Basic):

    Performed attachment analysis using sandbox tools (VirusTotal, Hybrid Analysis) to determine malicious behavior.

  • Log Analysis & Threat Hunting:

    Investigated proxy logs to identify suspicious outbound connections and correlate them with the incident timeline.

  • Incident Investigation & Correlation:

    Connected multiple data points (email delivery, attachment analysis, network logs) to determine that the file was executed.

  • Security Decision-Making:

    Made an informed judgment under uncertainty by combining indicator-based and behavior-based analysis.

  • Reporting & Documentation:

    Created a structured and professional incident report suitable for SOC environments and portfolio presentation.


14. Key Takeaway

This investigation highlights the importance of combining technical analysis with critical thinking. Even when clear indicators are limited, analyzing user behavior and network activity can reveal the true impact of a security incident.

This post is licensed under CC BY 4.0 by the author.