Query Details
//Defending against Windows Internet Shortcut Files Security Feature Bypass Vulnerability (CVE-2024-21412) //https://www.linkedin.com/pulse/defending-against-windows-internet-shortcut-files-security-steven-lim-tbnoe/ UrlClickEvents | where Timestamp > ago (1h) | where UrlChain matches regex "https?://.+\\.url(\\?.*)?(#.*)?$"
This query is designed to help defend against a specific security vulnerability (CVE-2024-21412) related to Windows Internet Shortcut Files.
Here's a simple breakdown of what the query does:
UrlClickEvents table, which presumably logs events where URLs are clicked.Timestamp > ago(1h)).https?://).+)\\?.*) or fragments (#.*).In summary, this query identifies URL click events from the past hour where the URLs match the pattern of potentially malicious Windows Internet Shortcut Files.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators