SPF (Sender Policy Framework)
Verifies if the sending IP is authorized by the domain owner. A spf=fail or softfail indicates an unauthorized sender. Note: SPF checks the Return-Path domain, not the visible From: address.
The golden rule of email analysis is Zero Trust. The analyst must never assume the safety of the sample or double-click the file within a standard operating environment.
cat, less) to inspect the raw MIME structure.Email headers are the definitive source of truth for tracing a message’s origin. They document the exact path the email took across the internet. Headers must be read from bottom to top.
Received: headers)Locate the series of Received: headers. The first Received: header (the one closest to the bottom of the header block) typically reveals the original Source IP address of the sender.
Locate the Authentication-Results header. This contains the verdict from the first trusted receiving server (e.g., Microsoft 365 or Google Workspace).
SPF (Sender Policy Framework)
Verifies if the sending IP is authorized by the domain owner. A spf=fail or softfail indicates an unauthorized sender. Note: SPF checks the Return-Path domain, not the visible From: address.
DKIM (DomainKeys Identified Mail)
Ensures message integrity. A dkim=fail means the cryptographic signature is invalid, suggesting the email was altered in transit or the signing key is forged.
DMARC (Domain-based Message Authentication)
Binds SPF and DKIM to the visible From: address. A dmarc=fail is the strongest technical indicator of a domain spoofing attempt. Look for the policy applied (e.g., p=quarantine or p=reject).
Adversaries often manipulate display addresses to deceive the recipient. Compare the following fields:
From: The address displayed to the end-user.Return-Path: The envelope sender (MAIL FROM), used for bounce messages and SPF checks.Reply-To: The address where the victim’s reply will actually be sent.From: is ceo@yourcompany.com, but the Return-Path is attacker@russian-domain.ru and the Reply-To is a free webmail address, it is a confirmed spoofing campaign.https://secure-bank.com) with the actual href destination (http://evil-phishing-domain.com).emlAnalyzer) to extract the attachment without executing it.Once the analysis concludes, the extracted IOCs must be weaponized to sweep the enterprise environment and eradicate the threat.
// Hunt for all emails received from the malicious sender IP or containing the bad URLEmailEvents| where SenderIPv4 == "198.51.100.42" or SenderMailFromAddress == "attacker@evil.com"| join kind=inner EmailUrlInfo on NetworkMessageId| where Url contains "evil-phishing-domain.com"| project Timestamp, Subject, SenderFromAddress, RecipientEmailAddress, DeliveryAction# Search email gateway logs for the malicious sender or specific attachment hashindex=email sourcetype=cisco:esa OR sourcetype=proofpoint(src_ip="198.51.100.42" OR sender="*@evil.com" OR file_hash="e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855")| table _time, recipient, sender, subject, action, file_nameIf the hunting queries reveal that a user successfully clicked the link or downloaded the attachment, immediately transition to theEDR Alert Triage Playbook to contain the compromised endpoint.