<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Know executable file in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/know-executable-file/m-p/1244774#M8942</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Please, any idea to known executable from Microsoft Office Ex: .docx file with XQL query.&lt;/P&gt;
&lt;P&gt;Best regards.&lt;/P&gt;</description>
    <pubDate>Sun, 04 Jan 2026 07:37:50 GMT</pubDate>
    <dc:creator>Bouzeghoub</dc:creator>
    <dc:date>2026-01-04T07:37:50Z</dc:date>
    <item>
      <title>Know executable file</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/know-executable-file/m-p/1244774#M8942</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Please, any idea to known executable from Microsoft Office Ex: .docx file with XQL query.&lt;/P&gt;
&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jan 2026 07:37:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/know-executable-file/m-p/1244774#M8942</guid>
      <dc:creator>Bouzeghoub</dc:creator>
      <dc:date>2026-01-04T07:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: Know executable file</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/know-executable-file/m-p/1244975#M8955</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1161122151"&gt;@Bouzeghoub&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="134" data-end="403"&gt;To identify executables associated with Microsoft Office activity (such as a &lt;CODE data-start="211" data-end="218"&gt;.docx&lt;/CODE&gt; file being opened in Word) using &lt;STRONG data-start="252" data-end="259"&gt;XQL&lt;/STRONG&gt;, you should query the &lt;STRONG data-start="282" data-end="296"&gt;&lt;CODE data-start="284" data-end="294"&gt;xdr_data&lt;/CODE&gt;&lt;/STRONG&gt; dataset. This dataset tracks real-time endpoint activity, including process execution and file operations.&lt;/P&gt;
&lt;P data-start="405" data-end="498"&gt;In the context of Microsoft Office, the primary processes responsible for handling files are:&lt;/P&gt;
&lt;UL data-start="499" data-end="670"&gt;
&lt;LI data-start="499" data-end="551"&gt;
&lt;P data-start="501" data-end="551"&gt;&lt;STRONG data-start="501" data-end="516"&gt;winword.exe&lt;/STRONG&gt; – Word documents (&lt;CODE data-start="535" data-end="541"&gt;.doc&lt;/CODE&gt;, &lt;CODE data-start="543" data-end="550"&gt;.docx&lt;/CODE&gt;)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="552" data-end="606"&gt;
&lt;P data-start="554" data-end="606"&gt;&lt;STRONG data-start="554" data-end="567"&gt;excel.exe&lt;/STRONG&gt; – Excel spreadsheets (&lt;CODE data-start="590" data-end="596"&gt;.xls&lt;/CODE&gt;, &lt;CODE data-start="598" data-end="605"&gt;.xlsx&lt;/CODE&gt;)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="607" data-end="670"&gt;
&lt;P data-start="609" data-end="670"&gt;&lt;STRONG data-start="609" data-end="625"&gt;powerpnt.exe&lt;/STRONG&gt; – PowerPoint presentations (&lt;CODE data-start="654" data-end="660"&gt;.ppt&lt;/CODE&gt;, &lt;CODE data-start="662" data-end="669"&gt;.pptx&lt;/CODE&gt;)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR data-start="672" data-end="675" /&gt;
&lt;H4 data-start="677" data-end="742"&gt;1. Identifying Child Processes (Executables Spawned by Office)&lt;/H4&gt;
&lt;P data-start="744" data-end="937"&gt;Attackers often use malicious macros in Office documents to spawn secondary processes. You can use the following query to identify when an Office application (the &lt;EM data-start="907" data-end="914"&gt;actor&lt;/EM&gt;) starts a new process:&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl corner-superellipse/1.1 relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-xql"&gt;&lt;SPAN&gt;dataset = xdr_data
| filter actor_process_image_name in ("winword.exe", "excel.exe", "powerpnt.exe")
| filter event_type = ENUM.PROCESS and event_sub_type = ENUM.PROCESS_START
| fields _time, agent_hostname, actor_process_image_name, action_process_image_name, action_process_image_command_line&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;HR data-start="1246" data-end="1249" /&gt;
&lt;H4 data-start="1251" data-end="1311"&gt;2. Identifying Executable Files Written to Disk by Office&lt;/H4&gt;
&lt;P data-start="1313" data-end="1463"&gt;You can also hunt for cases where an Office application creates an executable file (&lt;CODE data-start="1397" data-end="1403"&gt;.exe&lt;/CODE&gt;) on disk, which is a common indicator of a dropped payload:&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl corner-superellipse/1.1 relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-xql"&gt;&lt;SPAN&gt;dataset = xdr_data
| filter actor_process_image_name in ("winword.exe", "excel.exe", "powerpnt.exe")
| filter event_type = ENUM.FILE and action_file_extension = "exe"
| fields _time, agent_hostname, actor_process_image_name, action_file_name, action_file_path, action_file_sha256&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;HR data-start="1757" data-end="1760" /&gt;
&lt;H2 data-start="1762" data-end="1809"&gt;3. Identifying the Specific Document Trigger&lt;/H2&gt;
&lt;P data-start="1811" data-end="1961"&gt;To determine which document (for example, &lt;CODE data-start="1853" data-end="1867"&gt;invoice.docx&lt;/CODE&gt;) triggered the activity, inspect the Office process command line or related file-open events:&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl corner-superellipse/1.1 relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-xql"&gt;&lt;SPAN&gt;dataset = xdr_data
| filter actor_process_image_name = "winword.exe"
| filter actor_process_command_line contains ".docx"
| filter event_type = ENUM.PROCESS and event_sub_type = ENUM.PROCESS_START
| fields _time, agent_hostname, actor_process_command_line, action_process_image_name, action_process_image_command_line&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;HR data-start="2293" data-end="2296" /&gt;
&lt;H4 data-start="2298" data-end="2324"&gt;Summary of Data Sources&lt;/H4&gt;
&lt;UL data-start="2326" data-end="2601"&gt;
&lt;LI data-start="2326" data-end="2444"&gt;
&lt;P data-start="2328" data-end="2444"&gt;&lt;STRONG data-start="2328" data-end="2359"&gt;Process execution tracking:&lt;/STRONG&gt; Use the &lt;CODE data-start="2368" data-end="2378"&gt;xdr_data&lt;/CODE&gt; dataset or the &lt;CODE data-start="2394" data-end="2407"&gt;xdr_process&lt;/CODE&gt; preset for real-time threat hunting.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2445" data-end="2601"&gt;
&lt;P data-start="2447" data-end="2601"&gt;&lt;STRONG data-start="2447" data-end="2480"&gt;Installed software inventory:&lt;/STRONG&gt; If you only need to confirm which systems have Microsoft Office installed, use the &lt;CODE data-start="2564" data-end="2593"&gt;host_inventory_applications&lt;/CODE&gt; preset.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy New year!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2026 15:22:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/know-executable-file/m-p/1244975#M8955</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-01-06T15:22:42Z</dc:date>
    </item>
  </channel>
</rss>

