<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detection Logic For CVE-2023-23397 - Microsoft Outlook in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537057#M3989</link>
    <description>&lt;P&gt;Thank you for sharing&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163390"&gt;@KanwarSingh01&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried to create a similar query before where I didn't filter for outlook.exe but for all traffic going to these two ports. To achieve this I just filtered the local ip (to only see connections from internal devices):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| filter incidr(action_local_ip,"10.0.0.0/8") = true or incidr(action_local_ip,"192.168.0.0/16") = true or incidr(action_local_ip,"172.16.0.0/12") = true&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You probably will see more results but will also get the traffic with PID 4 from System. This definitely requires more filtering in results, what I've seen so far.&lt;/P&gt;
&lt;P&gt;Just to add ideas how to&amp;nbsp;&lt;SPAN&gt;hunt for CVE-2023-23397&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 30 Mar 2023 06:25:26 GMT</pubDate>
    <dc:creator>micomi</dc:creator>
    <dc:date>2023-03-30T06:25:26Z</dc:date>
    <item>
      <title>Detection Logic For CVE-2023-23397 - Microsoft Outlook</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/536483#M3940</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone having detection logic XQL query for&amp;nbsp;&lt;STRONG&gt;CVE-2023-23397&lt;/STRONG&gt; &lt;STRONG&gt;- Microsoft Outlook EOP&lt;/STRONG&gt; ? &lt;LI-PRODUCT title="Cortex XDR" id="Cortex_XDR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;#DetectionLogic #XQL #ThreatHunting #CVE-2023-23397&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Gokul K&lt;/P&gt;
&lt;H1 class="hero__title"&gt;&amp;nbsp;&lt;/H1&gt;</description>
      <pubDate>Sun, 26 Mar 2023 17:15:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/536483#M3940</guid>
      <dc:creator>Gokul_K</dc:creator>
      <dc:date>2023-03-26T17:15:52Z</dc:date>
    </item>
    <item>
      <title>Re: Detection Logic For CVE-2023-23397 - Microsoft Outlook</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/536600#M3949</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/202749"&gt;@Gokul_K&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Alto Networks is aware of CVE-2023-23397, and our Engineering team is actively researching possible signature coverage based on all the reports we received and our own testing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 13:28:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/536600#M3949</guid>
      <dc:creator>fmoixsante</dc:creator>
      <dc:date>2023-03-27T13:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: Detection Logic For CVE-2023-23397 - Microsoft Outlook</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537035#M3988</link>
      <description>&lt;P&gt;The best option will be to patch the system.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think the below two queries can help you hunt CVE-2023-23397&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Query 1: Outbound Connection to Public IP on Port 445 or 139 via Outlook.exe (Some systems are showing network connection from PID 4 which is System which makes it hard to hunt.)&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;config case_sensitive = false 
| preset = network_story 
| filter actor_process_image_name = "outlook.exe" and action_remote_port in (445,139)
| filter action_remote_ip != null
| filter incidr(action_remote_ip,"127.0.0.0/8") = false
| filter incidr(action_remote_ip,"10.0.0.0/8") = false 
| filter incidr(action_remote_ip,"192.168.0.0/16") = false 
| filter incidr(action_remote_ip,"172.16.0.0/12") = false
| filter incidr(action_remote_ip,"169.254.0.0/16") = false
| filter incidr(action_remote_ip,"224.0.0.0/4") = false 
| filter incidr(action_remote_ip,"255.255.255.255/32") = false
| iploc action_remote_ip loc_asn, loc_asn_org, loc_country, loc_city, loc_region 
| fields agent_hostname as Host, action_local_ip, action_remote_ip, action_remote_port, loc_asn, loc_asn_org, loc_country, loc_city, loc_region, actor_process_image_name as Process, actor_process_os_pid as PID, actor_process_command_line as Command, actor_process_image_path as Path, actor_process_signature_status as SignerStatus, actor_process_signature_vendor as Vendor, causality_actor_process_image_name as CGO
| sort desc _time&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Query 2: Outbound Connection via WebDav which will fallback if the above connection is not successful. (i.e. Outlook Not Connecting to SMB)&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;config case_sensitive = false 
| preset = network_story 
| filter actor_process_image_name = "rundll32.exe" and actor_process_command_line contains "DavSetCookie"
| filter action_remote_ip != null
| filter incidr(action_remote_ip,"127.0.0.0/8") = false
| filter incidr(action_remote_ip,"10.0.0.0/8") = false 
| filter incidr(action_remote_ip,"192.168.0.0/16") = false 
| filter incidr(action_remote_ip,"172.16.0.0/12") = false
| filter incidr(action_remote_ip,"169.254.0.0/16") = false
| filter incidr(action_remote_ip,"224.0.0.0/4") = false 
| filter incidr(action_remote_ip,"255.255.255.255/32") = false
| iploc action_remote_ip loc_asn, loc_asn_org, loc_country, loc_city, loc_region 
| fields agent_hostname as Host, action_local_ip, action_remote_ip, action_remote_port, loc_asn, loc_asn_org, loc_country, loc_city, loc_region, actor_process_image_name as Process, actor_process_os_pid as PID, actor_process_command_line as Command, actor_process_image_path as Path, actor_process_signature_status as SignerStatus, actor_process_signature_vendor as Vendor, causality_actor_process_image_name as CGO
| sort desc _time&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Kanwar&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 03:30:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537035#M3988</guid>
      <dc:creator>KanwarSingh01</dc:creator>
      <dc:date>2023-03-30T03:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: Detection Logic For CVE-2023-23397 - Microsoft Outlook</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537057#M3989</link>
      <description>&lt;P&gt;Thank you for sharing&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163390"&gt;@KanwarSingh01&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried to create a similar query before where I didn't filter for outlook.exe but for all traffic going to these two ports. To achieve this I just filtered the local ip (to only see connections from internal devices):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;| filter incidr(action_local_ip,"10.0.0.0/8") = true or incidr(action_local_ip,"192.168.0.0/16") = true or incidr(action_local_ip,"172.16.0.0/12") = true&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You probably will see more results but will also get the traffic with PID 4 from System. This definitely requires more filtering in results, what I've seen so far.&lt;/P&gt;
&lt;P&gt;Just to add ideas how to&amp;nbsp;&lt;SPAN&gt;hunt for CVE-2023-23397&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 06:25:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537057#M3989</guid>
      <dc:creator>micomi</dc:creator>
      <dc:date>2023-03-30T06:25:26Z</dc:date>
    </item>
    <item>
      <title>Re: Detection Logic For CVE-2023-23397 - Microsoft Outlook</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537164#M4000</link>
      <description>&lt;P&gt;Any reason why you are using action_local_ip instead of action_remote_ip?&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 02:06:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537164#M4000</guid>
      <dc:creator>KanwarSingh01</dc:creator>
      <dc:date>2023-03-31T02:06:51Z</dc:date>
    </item>
    <item>
      <title>Re: Detection Logic For CVE-2023-23397 - Microsoft Outlook</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537378#M4017</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163390"&gt;@KanwarSingh01&lt;/a&gt;&amp;nbsp;My snippet was thought as addition to yours. I'm using both, action_local_ip and action_remote_ip. My goal is to filter for traffic from internal devices (where Outlook is installed). Servers with public ip addresses aren't interesting in this case because there shouldn't be outlook installed.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;config case_sensitive = false 
| preset = network_story 
| filter action_remote_ip != null
| filter incidr(action_remote_ip,"127.0.0.0/8") = false
| filter incidr(action_remote_ip,"10.0.0.0/8") = false 
| filter incidr(action_remote_ip,"192.168.0.0/16") = false 
| filter incidr(action_remote_ip,"172.16.0.0/12") = false
| filter incidr(action_remote_ip,"169.254.0.0/16") = false
| filter incidr(action_remote_ip,"224.0.0.0/4") = false 
| filter incidr(action_remote_ip,"255.255.255.255/32") = false
| filter incidr(action_local_ip,"10.0.0.0/8") = true or incidr(action_local_ip,"192.168.0.0/16") = true or incidr(action_local_ip,"172.16.0.0/12") = true
| iploc action_remote_ip loc_asn, loc_asn_org, loc_country, loc_city, loc_region 
| fields agent_hostname as Host, action_local_ip, action_remote_ip, action_remote_port, loc_asn, loc_asn_org, loc_country, loc_city, loc_region, actor_process_image_name as Process, actor_process_os_pid as PID, actor_process_command_line as Command, actor_process_image_path as Path, actor_process_signature_status as SignerStatus, actor_process_signature_vendor as Vendor, causality_actor_process_image_name as CGO
| sort desc _time&lt;/LI-CODE&gt;
&lt;P&gt;Here a full query of my idea. Just a suggestion if there is traffic from SYSTEM which doesn't fit you filter, then it could be helpful to query with network filters only.&lt;/P&gt;
&lt;P&gt;Hope this helps&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 05:35:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537378#M4017</guid>
      <dc:creator>micomi</dc:creator>
      <dc:date>2023-04-03T05:35:43Z</dc:date>
    </item>
    <item>
      <title>Re: Detection Logic For CVE-2023-23397 - Microsoft Outlook</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537386#M4018</link>
      <description>&lt;P&gt;Hmm.... I guess we have different environments.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the reply.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Apr 2023 06:05:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detection-logic-for-cve-2023-23397-microsoft-outlook/m-p/537386#M4018</guid>
      <dc:creator>KanwarSingh01</dc:creator>
      <dc:date>2023-04-03T06:05:44Z</dc:date>
    </item>
  </channel>
</rss>

