Skip to main content
Malware Investigation: Emotet Epoch 4 Binary Padding Evasion operation cover
IntermediateSIEMXDRFirewallPRO

Malware Investigation: Emotet Epoch 4 Binary Padding Evasion

Investigate a resurgence of the Emotet botnet (Epoch 4) utilizing advanced defense evasion techniques. Trace the infection from a macro-enabled document to the deployment of inflated DLL payloads designed to bypass sandbox and scan engine limitations through binary padding. Analyze process hollowing of system utilities and the deployment of modular stealer components.

2h
23 tasks
150 points
Pro

Start this operation

Requires a Pro subscription.

View Pro Plans

Free forever โ€” no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Analyze Initial Macro Execution

5
SOC{process_name}Hint available
2

Identify Payload Download Failover

5
SOC{domain_name}Hint available
3

Detect File Inflation Evasion

10
SOC{size_in_mb}Hint available
4

Investigate DLL Execution Method

5
SOC{binary_name}Hint available
5

Identify Brute Force Origin

10

A series of RDP logon failures followed by a successful authentication suggests a brute-force attack. Identify the external IP address responsible for these attempts on the FIN-WS-04 workstation.

SOC{...}Hint available
6

Identify Loaded Stealer Modules

5
SOC{tool_name}Hint available
7

Analyze Phishing Delivery Vector

5
SOC{file_extension}Hint available
8

Trace OneNote Execution Tree

5
SOC{process_name}Hint available
9

Identify Evasion Patterns in Archives

5
SOC{alert_tag}Hint available
10

Identify Suspicious Task Creation

5
SOC{task_name}Hint available
11

Analyze WMI-Based Tasking

5
SOC{wmi_class}Hint available
12

Detect Hidden Tasks via Registry Deletion

10
SOC{registry_value}Hint available
13

Trace Process Lineage of Persistence

5
SOC{process_name}Hint available
14

Identify Discovery Commands

5
SOC{command}Hint available
15

Analyze Discovery Lineage

5
SOC{pid}Hint available
16

Detect Account Enumeration

5
SOC{binary_name}Hint available
17

Inspect Environment Variable Access

10
SOC{file_path}Hint available
18

Network Device Reconnaissance

10
SOC{ip_address}Hint available
19

Analyze Registry Persistence Key

5
SOC{key_name}Hint available
20

Trace Process Execution Proxy

5
SOC{process_name}Hint available
21

Investigate Encrypted C2 Traffic

5
SOC{port_number}Hint available
22

Correlate Phishing Influx

10
SOC{minutes}Hint available
23

Identify Secondary Payloads

10
SOC{sha256_hash}Hint available

23 tasks ยท 150 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
Firewall log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Intermediate

Requires foundational alert triage skills. Multiple data sources to correlate.

Prerequisites

  • Basic understanding of security alerts
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts
  • Familiarity with Firewall concepts

Ready to investigate?

This operation requires a Pro subscription.

View Pro Plans

Free forever โ€” no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more