A quick filter on the source address gave us the email.
Well, I guess we have to examine the attachments.
After unzipping the two layers of the zip archive, we have the .xls file. (If I’m correct, the reason the DLLs are included is that the domains they are supposed to be downloaded from have been removed. ) Throwing the research-1646684671.xls file into VirusTotal.
The second C2 IP returned logs. The request URL is a perfect match. The endpoint is infected. I imagine the next step in the playbook is to quarantine the box.
If I could add more artifacts, I would. I thought it would be best to leave the IP address of the SMTP server from which we received the phishing email.