← Back to SOC feed Coverage →

Star Blizzard-Domain IOCs

kql HIGH Azure-Sentinel
T1566
DeviceNetworkEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-05T23:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries are leveraging domain IOCs associated with Star Blizzard to establish command and control channels within the network. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect and mitigate potential advanced persistent threat activity early.

KQL Query

let IOCs_Domains = pack_array("cache-dns.com","cache-dns-forwarding.com","cache-dns-preview.com","cache-docs.com","cache-pdf.com","cache-pdf.online","cache-services.live",
                              "cloud-docs.com","cloud-drive.live","cloud-storage.live","docs-cache.com","docs-forwarding.online","docs-info.com","docs-shared.com",
                              "docs-shared.online","docs-view.online","document-forwarding.com","document-online.live","document-preview.com","documents-cloud.com",
                              "documents-cloud.online","documents-forwarding.com","document-share.live","documents-online.live","documents-pdf.online","documents-preview.com",
                              "documents-view.live","document-view.live","drive-docs.com","drive-share.live","goo-link.online","hypertextteches.com","mail-docs.online",
                              "officeonline365.live","online365-office.com","online-document.live","online-storage.live","pdf-cache.com","pdf-cache.online","pdf-docs.online",
                              "pdf-forwarding.online","protection-checklinks.xyz","protection-link.online","protectionmail.online","protection-office.live","protect-link.online",
                              "proton-docs.com","proton-reader.com","proton-viewer.com","relogin-dashboard.online","safe-connection.online","safelinks-protect.live","secureoffice.live",                                
                              "webresources.live","word-yand.live","yandx-online.cloud","y-ml.co","docs-drive.online","docs-info.online","cloud-mail.online","onlinecloud365.live",
                              "pdf-cloud.online","pdf-shared.online","proton-pdf.online","proton-view.online","cloud-mail.online","office365-online.live","doc-viewer.com",
                              "file-milgov.systems","office-protection.online");
DeviceNetworkEvents 
| where RemoteUrl has_any(IOCs_Domains)

Analytic Rule Definition

id: 4b14590a-a1f0-4756-9f3d-baafa696e051
name: Star Blizzard-Domain IOCs
description: |
  'This query identifies matches based on domain IOCs related to Star Blizzard against Microsoft Defender for Endpoint device network connections'
severity: High
requiredDataConnectors:
  - connectorId: MicrosoftThreatProtection
    dataTypes:
      - DeviceNetworkEvents
tactics:
  - InitialAccess
relevantTechniques:
  - T1566
query: |
  let IOCs_Domains = pack_array("cache-dns.com","cache-dns-forwarding.com","cache-dns-preview.com","cache-docs.com","cache-pdf.com","cache-pdf.online","cache-services.live",
                                "cloud-docs.com","cloud-drive.live","cloud-storage.live","docs-cache.com","docs-forwarding.online","docs-info.com","docs-shared.com",
                                "docs-shared.online","docs-view.online","document-forwarding.com","document-online.live","document-preview.com","documents-cloud.com",
                                "documents-cloud.online","documents-forwarding.com","document-share.live","documents-online.live","documents-pdf.online","documents-preview.com",
                                "documents-view.live","document-view.live","drive-docs.com","drive-share.live","goo-link.online","hypertextteches.com","mail-docs.online",
                                "officeonline365.live","online365-office.com","online-document.live","online-storage.live","pdf-cache.com","pdf-cache.online","pdf-docs.online",
                                "pdf-forwarding.online","protection-checklinks.xyz","protection-link.online","protectionmail.online","protection-office.live","protect-link.online",
                                "proton-docs.com","proton-reader.com","proton-viewer.com","relogin-dashboard.online","safe-connection.online","safelinks-protect.live","secureoffice.live",                                
                                "webresources.live","word-yand.live","yandx-online.cloud","y-ml.co","docs-drive.online","docs-info.online","cloud-mail.online","onlinecloud365.live",
                                "pdf-cloud.online","pdf-shared.online","proton-pdf.online","proton-view.online","cloud-mail.online","office365-online.live","doc-viewer.com",
                                "file-milgov.systems","office-protection.online");
  DeviceNetworkEvents 
  | where RemoteUrl has_any(IOCs_Domains)

Required Data Sources

Sentinel TableNotes
DeviceNetworkEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/StarBlizzardDomainIOCsAug2022.yaml