<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Find the responsible application in Windows for making malicious DNS requests in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/find-the-responsible-application-in-windows-for-making-malicious/m-p/590479#M6853</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/922167235"&gt;@Arman_Zaheri&lt;/a&gt;, thanks for reaching us using the Live Community.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try this XQL Query with your required data:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;dataset = xdr_data
| filter agent_hostname = "Your_Hostname" //If needed
| filter event_type = ENUM.STORY 
| filter dns_query_name contains "microsoft" // Set your domain to search
| fields agent_hostname, agent_ip_addresses, actor_process_image_name, actor_process_image_path, causality_actor_process_command_line, dns_query_name &lt;/LI-CODE&gt;
&lt;P&gt;Please let us know how it goes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this post answers your question, please mark it as the solution.&lt;/P&gt;</description>
    <pubDate>Wed, 26 Jun 2024 13:44:21 GMT</pubDate>
    <dc:creator>jmazzeo</dc:creator>
    <dc:date>2024-06-26T13:44:21Z</dc:date>
    <item>
      <title>Find the responsible application in Windows for making malicious DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/find-the-responsible-application-in-windows-for-making-malicious/m-p/590423#M6847</link>
      <description>&lt;P&gt;Hello everybody,&lt;/P&gt;
&lt;P&gt;I sometimes receive alerts from our firewall blocking a malicious DNS request, but when I want to track it to the application that made that request, I just see Windows DNS cache service. Is there any way to audit specific DNS requests e.g. "gyoutube.com" ,which is actually malicious, in a Windows client using Cortex or other tools and find exactly which process made that request?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Many thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 06:40:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/find-the-responsible-application-in-windows-for-making-malicious/m-p/590423#M6847</guid>
      <dc:creator>Arman_Zaheri</dc:creator>
      <dc:date>2024-06-26T06:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: Find the responsible application in Windows for making malicious DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/find-the-responsible-application-in-windows-for-making-malicious/m-p/590479#M6853</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/922167235"&gt;@Arman_Zaheri&lt;/a&gt;, thanks for reaching us using the Live Community.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try this XQL Query with your required data:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;dataset = xdr_data
| filter agent_hostname = "Your_Hostname" //If needed
| filter event_type = ENUM.STORY 
| filter dns_query_name contains "microsoft" // Set your domain to search
| fields agent_hostname, agent_ip_addresses, actor_process_image_name, actor_process_image_path, causality_actor_process_command_line, dns_query_name &lt;/LI-CODE&gt;
&lt;P&gt;Please let us know how it goes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this post answers your question, please mark it as the solution.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 13:44:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/find-the-responsible-application-in-windows-for-making-malicious/m-p/590479#M6853</guid>
      <dc:creator>jmazzeo</dc:creator>
      <dc:date>2024-06-26T13:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: Find the responsible application in Windows for making malicious DNS requests</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/find-the-responsible-application-in-windows-for-making-malicious/m-p/590572#M6857</link>
      <description>&lt;P&gt;Hello again,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/32392"&gt;@jmazza&lt;/a&gt;&amp;nbsp;many thanks for the quick and correct answer. I was using the following query before that utilizes "network_story" preset and usually I could find DNS requests made by a host, but not the latter one&amp;nbsp; mentioned. What's the difference between using this preset and xdr_data in this case?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;preset= network_story
| filter (dns_query_name != null)
| arrayexpand dns_resolutions
| filter (dns_query_name contains "gyoutube")&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2024 06:03:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/find-the-responsible-application-in-windows-for-making-malicious/m-p/590572#M6857</guid>
      <dc:creator>Arman_Zaheri</dc:creator>
      <dc:date>2024-06-27T06:03:04Z</dc:date>
    </item>
  </channel>
</rss>

