Phishing - List of links opened from Outlook
EDRhuntingT1566
FDR intermediatepor CrowdStrike (cql-hub.com) 1 min read
Query
#event_simpleName=ProcessRollup2
| aid=?aid ImageFileName=/\\outlook\.exe/i
| regex("(?<FileName>[^\\/|\\\\]*)$", field=ImageFileName, strict=false)
| join(
{
#event_simpleName=ProcessRollup2 ImageFileName=/(chrome|firefox|iexplore)\.exe/i
| MD5:=MD5HashData | ImageFileName=/(\/|\\)(?<ChildFileName>\w*\.?\w*)$/
| ChildCLI:=CommandLine
},
key=ParentProcessId, field=TargetProcessId, include=[MD5, ChildFileName, ChildCLI]
)
| groupBy([aid, FileName, CommandLine, ChildFileName, ChildCLI, MD5], limit=max)Explicación
Importado desde cql-hub.com. Agrega explicación de pipes aquí.
Variables a ajustar
Revisa y ajusta los valores según tu entorno.