Query Details
# List inboxes that recieved an ISO attachment
## Query Information
#### Description
Adversaries may use ISO files as email attachment to trick users into opening those malicious files. Trend Micro has done reaches on spam campgains that use ISO image files to deliver Lokibot and NanoCore malware onto victems devices. Recieving the ISO does not mean that the user is infected, depending on the malware, the user is mostly only infected after the ISO has been mapped or if files on the ISO have been opened. This query detects all inbound emails that contain a ISO image.
By default ISO files are blocked in Exchange, your admin can unblock those file extensions. Thus this query should only trigger if a ISO is recieved and your admin has configured your environment in a way that ISO files are accepted.
#### Risk
A user opens the ISO file that contains malware and grants the adversery initial access to the network.
#### References
- https://www.netskope.com/blog/lokibot-nanocore-iso-disk-image-files
- https://www.trendmicro.com/vinfo/it/security/news/cybercrime-and-digital-threats/malicious-spam-campaign-uses-iso-image-files-to-deliver-lokibot-and-nanocore
- https://support.microsoft.com/en-us/office/blocked-attachments-in-outlook-434752e1-02d3-4e90-9124-8b81e49a8519
## Defender For Endpoint
```
EmailEvents
| where EmailDirection == 'Inbound'
| join kind=inner EmailAttachmentInfo on NetworkMessageId
| project
Timestamp,
NetworkMessageId,
SenderFromAddress,
SenderIPv4,
SenderIPv6,
RecipientEmailAddress,
Subject,
FileName,
FileType,
ThreatNames
| where FileName endswith ".iso"
```
## Sentinel
```
EmailEvents
| where EmailDirection == 'Inbound'
| join kind=inner EmailAttachmentInfo on NetworkMessageId
| project
TimeGenerated,
NetworkMessageId,
SenderFromAddress,
SenderIPv4,
SenderIPv6,
RecipientEmailAddress,
Subject,
FileName,
FileType,
ThreatNames
| where FileName endswith ".iso"
```This query detects all inbound emails that contain an ISO image attachment. It retrieves information such as the timestamp, network message ID, sender's email address, sender's IP address, recipient's email address, subject, file name, file type, and threat names. It filters the results to only include emails with file names that end with ".iso". The purpose of this query is to identify potential malicious ISO attachments that could be used to deliver malware and grant adversaries initial access to the network.

Bert-Jan Pals
Released: February 14, 2023
Tables
Keywords
Operators