Skip to content

Commit

Permalink
Merge pull request #11440 from Azure/v-visodadasi/MaliciousURL
Browse files Browse the repository at this point in the history
Removed the broken URL in Endpoint Threat Protection Essentials
  • Loading branch information
v-prasadboke authored Nov 21, 2024
2 parents 7cb8aa3 + 2bcaae2 commit efb2dc0
Show file tree
Hide file tree
Showing 5 changed files with 247 additions and 244 deletions.
Original file line number Diff line number Diff line change
@@ -1,8 +1,7 @@
id: e7470b35-0128-4508-bfc9-e01cfb3c2eb7
name: Detecting Macro Invoking ShellBrowserWindow COM Objects
description: |
'This query detects a macro invoking ShellBrowserWindow COM Objects evade naive parent/child Office detection rules.
Ref: https://blog.menasec.net/2019/02/threat-hunting-doc-with-macro-invoking.html'
'This query detects a macro invoking ShellBrowserWindow COM Objects evade naive parent/child Office detection rules.'
severity: Medium
status: Available
requiredDataConnectors:
Expand Down Expand Up @@ -45,5 +44,5 @@ entityMappings:
fieldMappings:
- identifier: Name
columnName: User
version: 1.0.3
version: 1.0.4
kind: Scheduled
Binary file not shown.
Original file line number Diff line number Diff line change
Expand Up @@ -142,7 +142,7 @@
"name": "analytic5-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This query detects a macro invoking ShellBrowserWindow COM Objects evade naive parent/child Office detection rules.\nRef: https://blog.menasec.net/2019/02/threat-hunting-doc-with-macro-invoking.html"
"text": "This query detects a macro invoking ShellBrowserWindow COM Objects evade naive parent/child Office detection rules."
}
}
]
Expand Down
Loading

0 comments on commit efb2dc0

Please sign in to comment.