Phishing Email Investigation
When a phishing email is reported or detected, investigate by analyzing email headers for spoofing indicators, inspecting URLs against threat intelligence, checking if any user clicked or submitted credentials, and correlating across SIEM logs for other recipients. Escalate if credentials were submitted or malware was executed. Contain by resetting passwords and blocking malicious domains.
Overview
Phishing investigations are the most common alert type in any SOC. A typical enterprise receives hundreds of phishing attempts daily, and the difference between a contained incident and a breach often comes down to how quickly and thoroughly an analyst investigates the initial alert. This playbook walks you through the complete investigation workflow from initial triage to containment, covering email header analysis, URL reputation checking, credential compromise assessment, and lateral spread detection.
You will learn to distinguish mass commodity phishing from targeted spearphishing, identify indicators of compromise that warrant escalation, and document your findings for incident response handoff. The techniques in this playbook apply across all major email security platforms and SIEM tools.
When You See This
- 1
Email security gateway flags an inbound message as suspicious
- 2
User reports a phishing email via the report button or help desk
- 3
SIEM alert fires on a user clicking a URL categorized as newly registered or low-reputation
- 4
XDR detects a process spawn from an email attachment (e.g., Word spawning PowerShell)
- 5
Multiple users receive the same suspicious email within a short time window
- 6
Authentication logs show login attempts from a location inconsistent with the user profile shortly after email delivery
Investigation Steps
- 1
Analyze email headers and metadata
Extract the full email headers and examine the sending infrastructure. Check SPF, DKIM, and DMARC alignment. Look for display name spoofing where the "From" name differs from the actual sending address. Note the originating IP and check it against threat intelligence feeds. Identify whether the email was sent to a single recipient or part of a mass campaign by examining the recipient list and email gateway logs.
SIEMindex=email sourcetype=exchange OR sourcetype=o365 sender_domain="suspicious-domain.com" | stats count by recipient, subject, sender_ip
index=email action=delivered | where match(sender_display, "(?i)IT Support|Helpdesk|Admin") AND NOT match(sender_address, "@company\.com$") | table _time, sender_display, sender_address, recipient, subject
- 2
Inspect URLs and attachments
Extract all URLs from the email body and attachments. Check each URL against threat intelligence services, looking for newly registered domains (< 30 days), URL shorteners redirecting to unknown destinations, and domains that typosquat legitimate services. For attachments, check file hashes against VirusTotal or similar services. Note any macro-enabled documents, password-protected archives, or double-extension files.
SIEMFirewallindex=proxy url="*suspicious-domain*" | stats count by src_ip, url, http_status | sort -count
index=email attachment_hash=* | lookup threat_intel hash AS attachment_hash OUTPUT threat_name, confidence | where isnotnull(threat_name)
Decision Point
If: URL leads to a credential harvesting page or attachment contains malware
Yes → Immediately escalate to Tier 2 and proceed to Step 5 (containment). This is now an active incident.
No → Continue investigation. The email may still be malicious. proceed to Step 3.
- 3
Determine if any user interacted
Search proxy logs, DNS logs, and endpoint telemetry to determine if any recipient clicked the URL or opened the attachment. Check web proxy logs for connections to the suspicious domain. Review endpoint detection logs for process creation events linked to email client applications. Look for signs of credential submission by checking authentication logs for the targeted service.
SIEMXDRindex=proxy OR index=dns dest="suspicious-domain.com" | stats earliest(_time) as first_seen, latest(_time) as last_seen, count by src_ip, user
index=endpoint parent_process_name IN ("outlook.exe", "thunderbird.exe") | stats count by dest_host, process_name, process_command_line | sort -countDecision Point
If: A user clicked the link or opened the attachment
Yes → Move to Step 4 to assess credential compromise and potential malware execution.
No → Good news; no interaction detected. Skip to Step 6 to document and close. Block the sender domain as a precaution.
- 4
Assess credential compromise
If a user interacted with a credential harvesting page, check authentication logs for the affected account. Look for successful logins from new IP addresses or locations, especially within 1-4 hours of the phishing email delivery. Check for MFA bypass attempts, new MFA device enrollments, or OAuth application consent grants. Review mailbox rules for auto-forwarding to external addresses.
SIEMXDRindex=auth user="affected_user" | stats count by src_ip, action, app | where src_ip!="known_corporate_ranges"
index=azure_ad OR index=okta eventType IN ("user.session.start", "policy.evaluate_sign_on") user="affected_user" | timechart span=1h count by outcomeDecision Point
If: Unauthorized access detected or credentials confirmed compromised
Yes → Escalate to Incident Response. Immediately reset the password, revoke all sessions, and review recent account activity for data access.
No → Reset the password as a precaution. Monitor the account for 48 hours for suspicious activity.
- 5
Contain the threat
Based on your findings, take appropriate containment actions. Block the malicious sender domain and URLs at the email gateway and web proxy. If credentials were compromised, force a password reset and revoke active sessions. If malware was executed, isolate the affected endpoint. Search for and remove the phishing email from all recipient mailboxes using email admin tools.
SIEMXDRFirewallindex=email subject="exact phishing subject" action=delivered | stats count by recipient | outputlookup phishing_recipients.csv
- 6
Document findings and close
Record all investigation findings including: initial alert source, email analysis results, list of affected users, containment actions taken, and recommendations for prevention. Update the ticket with IOCs (malicious URLs, sender addresses, file hashes) for threat intelligence. If this was a targeted attack, note the target selection pattern for future monitoring. Close the alert with appropriate classification (true positive or false positive).
SIEM
Common Mistakes
- 1
Only checking the displayed sender name instead of examining the full email headers and actual sending address
- 2
Failing to search for other recipients of the same phishing campaign; one user report often means dozens received it
- 3
Closing the alert after confirming "no click" without blocking the malicious domain for future protection
- 4
Not checking for auto-forwarding rules that attackers add to compromised mailboxes for persistent access
- 5
Assuming the investigation is complete after password reset without monitoring for continued unauthorized access
Escalation Criteria
User submitted credentials to a harvesting page and unauthorized access is confirmed
Malware executed on an endpoint after attachment was opened
Targeted spearphishing against executives or employees with privileged access
Campaign targeting multiple users simultaneously, suggesting coordinated attack
Practice This Investigation
SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including phishing email investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.
Frequently Asked Questions
- How long should a phishing investigation take?
- A straightforward phishing investigation where no user interacted should take 15-25 minutes. If credentials were compromised or malware executed, the investigation expands to 1-3 hours as you assess lateral movement and data access. The key is not rushing the initial triage; missing a credential compromise in the first pass creates much larger problems.
- What is the difference between phishing and spearphishing?
- Phishing is a mass campaign sent to many recipients with generic lures (fake invoices, password resets). Spearphishing targets specific individuals using personalized content gathered through reconnaissance, mentioning real projects, colleagues, or recent events. Spearphishing requires more investigation effort because the emails appear more legitimate and may bypass standard email filters.
- Should I block the sender domain immediately?
- Yes, if you have confirmed the email is malicious. Block at the email gateway and add the domain to your web proxy blocklist. However, be cautious with domains that are typosquats of legitimate services; blocking too broadly could impact business operations. Always verify the domain is not a legitimate service before blocking.
- How do I practice phishing investigations?
- SOCSimulator provides realistic phishing scenarios in both Operations rooms and Shift Mode. You can investigate AI-generated phishing campaigns with real SIEM alerts, email headers, and proxy logs, building the muscle memory you need for production SOC work. Start free forever at socsimulator.com.
Related SOC Training Resources
Phishing (T1566) — Detection Training
Phishing is a social engineering technique where adversaries send fraudulent electronic messages to gain access to victi…
Read more TechniqueValid Accounts (T1078) — Detection Training
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining initial access, persistence, pri…
Read more TechniqueUser Execution (T1204) — Detection Training
An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engin…
Read more GlossaryWhat is Phishing? — SOC Glossary
Phishing is a social engineering attack delivered via email, SMS, voice calls, or other channels that deceives recipient…
Read more GlossaryWhat is Social Engineering? — SOC Glossary
Social engineering is the psychological manipulation of individuals into performing actions or revealing information tha…
Read more GlossaryWhat is IOC? — SOC Glossary
An Indicator of Compromise (IOC) is an observable artifact, such as a file hash, IP address, domain name, URL, registry …
Read more GlossaryWhat is Alert Triage? — SOC Glossary
Alert triage is the structured process of reviewing, prioritizing, and investigating security alerts to determine their …
Read more Career PathSOC Analyst (Tier 1) Career Guide — Salary & Skills
Tier 1 SOC Analysts are the front line. You monitor alert queues, triage incoming detections, classify them as true or f…
Read more Career PathSOC Analyst (Tier 2) Career Guide — Salary & Skills
Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…
Read more ComparisonSOCSimulator vs LetsDefend — Comparison
SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…
Read more ComparisonSOCSimulator vs TryHackMe — Comparison
SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…
Read more PlaybookBrute Force Attack Investigation — Investigation Playbook
When authentication logs show repeated failed login attempts against one or more accounts, investigate by identifying th…
Read more