security portfolio + blog

by Nicholas Coleman

Download as .zip Download as .tar.gz View on GitHub
20 April 2025

Malvertisement Post-Incident Report

by Nicholas Coleman

PIR - bluemoontuesday LLC.

Nicholas H. Coleman

Executive Summary

Incident ID: INC-2025-01-22

Incident Severity: High

Incident Status: Resolved

Incident Overview: On January 22nd 2025, an incident occurred at the organization: bluemoontuesday. An employee, while searching for Google Authenticator online, downloaded a suspicious file. Our SOC team was notified that this incident may have been similar to these previous cases: Incident-1, Incident-2. Once notified of the incident, our team was provided a PCAP file containing the associated network traffic.

The team was then able to locate the infected Windows host along with the name of the user who was involved in the download of the initial malicious file. The domain name for the malicious site as well as the C2 Servers associated were also found. We were then able to contain the threat by denylisting the C2 Servers and all domains associated.

Key Findings

Initial Infection Vector
The incident was initiated when a user at bluemoontuesday attempted to download Google Authenticator but instead retrieved a suspicious file named application_setup.js from a malicious domain.

Confirmed Malware Activity
A PowerShell script identified as pas.ps1 was confirmed as a malicious payload used during the infection. This matched patterns seen in previous incidents (Incident-1, Incident-2).

Infected Host Identified
Analysis of the provided PCAP file confirmed that the compromised Windows host was:

Malicious Infrastructure Identified
Multiple domains and IP addresses were involved in hosting and serving the malicious content, including:

Additional Malicious Artifacts Discovered
Forensic analysis revealed several suspicious files on the affected host, consistent with abuse of remote access tools and script-based payloads:

Filename Type Suspicion Hash
pas.ps1 PowerShell Likely primary payload script a833f27c…
skqllz.ps1 PowerShell Possibly secondary script fd045fce…

Threat Containment

Root Cause Analysis

User Behavior/Social Engineering
The root cause of the incident was a user-initiated download of a malicious JavaScript file (application_setup.js) after interacting with a malicious advertisement masquerading as a Google Authenticator download.

The domain: *google-authenticator.burleson-appliance[.]net* was designed to convince targets of its legitimacy, increasing the likelihood of user interaction/download.

Malvertising
A malvertising campaign on Bing - an increasing issue in today’s cyber-security landscape, is to blame for the initial infection. Clicking on this particular malvertisement initiated the download of a JavaScript dropper which then invoked the Windows Script Host to execute code from one of the threat actor’s C2 remote servers - 5.252.153[.]241.

Execution of Remote Payload Script
The JavaScript file then used a call to download and execute the pas.ps1 malicious script from this remote server.

This method bypasses traditional means of downloading, leveraging trusted Windows system components to directly execute code. This severely limits the ability of anti-virus scanners and endpoint defense measures to detect any malicious downloads.

Lack of Application Allowlisting
The initial file was a tiny 72-byte JavaScript file without even a line terminator. A file of this size can potentially bypass antivirus/content scanners.

Bluemoontuesday’s online work environment allowed for the execution of scripts by users without necessary and sufficient security restrictions. This oversight is what ultimately expedited the rapid compromise of the system.

Additionally, the malicious domains involved in this incident were not denylisted by bluemoontuesday’s web filtering systems. Furthermore, the redirection chain through Bing was not blocked by DNS filtering or browser security plugins. An insecure browser environment is partly to blame.

Insufficient Detection
Detection only occurred after network traffic analysis via PCAP, indicating that initial infection and payload delivery went unnoticed by endpoint security or behavioral monitoring systems.

Recommendations

To prevent similar incidents in the future, the following actions are recommended for immediate implementation:

DNS Filtering and Web Content Controls

Strengthen Endpoint Protection

Enhance Browser and Ad Security

User Awareness Training

PowerShell Logging and Restriction

Network Monitoring and Segmentation

Regular Threat Intelligence Integration

Email and Browser Isolation (Optional)

tags: malware-traffic