You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Nov 16, 2023. It is now read-only.
// Query for links opened from mail apps – if a detection occurred right afterwards. - MTP Schema
38
+
// As there are many links opened from mails, to have a successful hunt we should have some filter or join with some other signal,
39
+
// such as suspicious processes, network connections, etc.
40
+
// Therefore, in this example, we query for alerts that might be related to links sent via email.
41
+
// This could be indicative of a phishing or spear-phishing attacks.
42
+
// Tags: #EmailLink, #Phishing, #GetNearbyAlerts
43
+
// Explaining the underlying data:
44
+
// This query uses the BrowserLaunchedToOpenUrl event, that includes clicks on http:// or https:// links (clicks outside of browsers), or on .lnk files
45
+
// For this event, RemoteUrl contains the opened URL.
46
+
let minTimeRange = ago(7d);
47
+
let outlookLinks =
48
+
DeviceEvents
49
+
// Filter on click on links from outlook
50
+
| where Timestamp > minTimeRange and ActionType == "BrowserLaunchedToOpenUrl" and isnotempty(RemoteUrl)
51
+
| where
52
+
// outlook.exe is the Office Outlook app
53
+
InitiatingProcessFileName =~ "outlook.exe"
54
+
// RuntimeBroker.exe opens links for all apps from the Windows store, including the Windows Mail app (HxOutlook.exe).
55
+
// However, it will also include some links opened from other apps.
56
+
or InitiatingProcessFileName =~ "runtimebroker.exe"
0 commit comments