askvpb
Apr 04, 2022Brass Contributor
Help with Advance hunting query - Phishing
I'm currently working on a sphere fishing security incident; I need help with writing an advance hunting query to lookup for emails coming from specific phishing email ID/domain with malicious URL. Malicious URL takes use of the fake login page pretending to be a SharePoint login site.
In my case, some users have clicked the phishing link and sent to fake login page which users have attempted to login.
I need help to write KQL query to find users who received phishing email & already clicked phishing URL link on the email and entered credentials. Search those users' signing login from non-familiar location after they click phising url.
EmailEvents
|where SenderMailFromAddress == 'Email address removed'
|project RecipientEmailAddress,UrlCount
So far, I don't know how to take recipent email address from the below query and run against the AAD signin logs? Any help is appreciated.
- This might give you some ideas of how to track URLs clicked, in addition to the queries you just posted.
https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/hunting-tip-of-the-month-downloads-originating-from-email-links/ba-p/239594