Post

SOC Alert Investigation: EventID 82 - Phishing Mail Detected [SOC140]

SOC Alert Investigation: EventID 82 - Phishing Mail Detected [SOC140]

Platform: LetsDefend
Alert ID: SOC140
Event ID: 82
Alert Name: Phishing Mail Detected - Suspicious Task Scheduler
Incident Type: Email / Phishing / Malware
Event Time: Mar, 21, 2021, 12:26 PM



Incident Summary

CategoryDetails
Incident IDSOC 140
Alert RulePhishing Mail Detected - Suspicious Task Scheduler
Event TimeMar, 21, 2021, 12:26 PM
SeverityMedium
VerdictTrue Positive (Blocked Attempt)

Alert Details

SOC140 Alert Details

The alert originated from the Email Gateway, triggering on suspicious task scheduler activity associated with a phishing email targeting user Mark.


Investigation & Triage

A. Email Analysis

The alert originated from the Email Gateway. A suspicious email was detected targeting the user Mark.

Email Details

Email Metadata

  • Sender: aaronluo@cmail.carleton.ca (Likely a compromised academic account).
  • Subject: COVID19 Vaccine (Lure: Health/Fear).
  • Recipient: mark@letsdefend.io
  • Action Taken: Blocked (The email was stopped before delivery).

Suspicious Indicators

  1. Urgency: “Open it now!”
  2. Evasion: The body contained password: infected. Attackers password-protect archives to prevent automated scanners from inspecting the files inside.

B. Artifact Analysis (The Payload)

We extracted the attachment hash from the alert logs to perform deep analysis.

  • Attachment Name: 72c812cf21909a48eb9cceb9e04b865d.zip
  • Malicious File Inside: Material.pdf (Actually an Executable).
  • MD5: 72c812cf21909a48eb9cceb9e04b865d

1. Threat Intelligence Results

VirusTotal Analysis

VirusTotal Results

  • VirusTotal: 21/56 security vendors flagged this file as malicious.
    • Popular Threat Label: Trojan.Fraud
    • Threat Categories: Trojan, Downloader, Phishing

Hybrid Analysis

Hybrid Analysis Overview

  • HybridAnalysis: Malicious Verdict.
    • Threat Score: 100/100
    • AV Detection: 65%
    • Labeled As: Trojan.PDF.Fraud

2. Dynamic Analysis (Sandbox Behavior - ANY.RUN)

ANY.RUN Sandbox Execution

The malware was executed in a controlled sandbox environment. The following behaviors were observed:

Execution Chain

  • The user downloads the ZIP from download.cyberlearn.academy.
  • The file Material.pdf is extracted and executed.
  • LodaRAT Behavior: The process masquerades as a PDF but executes AutoIT scripts to initiate network connections.

Network Activity (C2)

  • Initial Download: https://download.cyberlearn.academy/download/download... (Redirects to AWS S3 bucket).
  • Command & Control: Immediate connection to https://a.pomf.cat/hgfetb.R11. This is a “dead drop” resolver used to fetch the next stage payload or configuration.
  • IP Connection: Traffic observed to 3.5.129.36.

Dropped Files & Indicators

  • C:\Users\admin\Downloads\...\Material.pdf
  • Temporary files created in Edge User Data folders (e.g., load_statistics.db-wal), indicating the malware attempts to interact with or steal browser data.

Malware Identification

  • Sandboxing Results (ANY.RUN): The file Material.pdf is an AutoIT compiled executable.
  • Malware Family: LodaRAT (Loda).
  • Behavior Observed:
    1. C2 Connection: The malware reached out to https://a.pomf.cat/hgfetb.R11 to download a secondary stage/config.
    2. Persistence: It executed schtasks.exe (Task Scheduler) to ensure it runs automatically on reboot. This behavior matches the alert rule “Suspicious Task Scheduler.”

Impact Assessment

  • Did the user receive the email? No. The gateway status is Blocked.
  • Did the malware execute? No. Endpoint logs for Mark show no traffic to pomf.cat and no processes named Material.pdf.

Indicators of Compromise (IOCs)

TypeValueDescription
C2 Domaina.pomf.catHosted the second-stage payload.
C2 URLhttps://a.pomf.cat/hgfetb.R11Specific malware resource.
File Hash (MD5)72c812cf21909a48eb9cceb9e04b865dThe malicious ZIP attachment.
File Hash (SHA256)39fb927c32221134a423760c5d1f58bca4cbbcc87c891c79e390a22b63608eb4The dropped executable (Material.pdf).

Mitigation & MITRE ATT&CK

Current Status: The threat was neutralized at the gateway. No further action is required on the endpoint.

MITRE ATT&CK Mapping

  • T1566.001 (Phishing: Spearphishing Attachment): The delivery vector via email.
  • T1027.013 (Obfuscated Files or Information: Encrypted/Compressed): Using a password-protected ZIP to hide the malware.
  • T1053.005 (Scheduled Task/Job: Scheduled Task): The malware’s method for persistence (LodaRAT signature).
  • T1036.008 (Masquerading): Naming the executable Material.pdf to trick the user.

Analysis Date: January 15, 2025
Analyst: El OMARI Zakaria

This post is licensed under CC BY 4.0 by the author.