T1137.004
Outlook Home Page
Adversaries abuse Microsoft Outlook's Home Page feature to load a malicious HTML/script page in the Outlook folder view, achieving persistent code execution whenever the affected folder is opened. The Home Page URL is stored in the user's mailbox, making it invisible to standard file monitoring. OilRig (APT34) has abused this technique along with CVE-2017-11774 to bypass Home Page restrictions. The Ruler tool automates both installation and triggering.
Microsoft Sentinel / Defender
kusto
// T1137.004 — Outlook Home Page persistence detection
// The Home Page URL is stored per-folder in the mailbox; execution leaves browser/script engine traces
// Part 1: Detect Outlook spawning browser-related or scripting processes (Home Page execution)
let OutlookHomePage = DeviceProcessEvents
| where Timestamp > ago(24h)
| where InitiatingProcessFileName =~ "outlook.exe"
| where FileName in~ ("iexplore.exe", "msedge.exe", "wscript.exe", "cscript.exe",
"mshta.exe", "powershell.exe", "cmd.exe", "rundll32.exe")
| extend DetectionType = "Outlook_Home_Page_Child_Proc"
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionType;
// Part 2: Detect registry keys for Outlook folder Home Page URL settings
let OutlookHomepageReg = DeviceRegistryEvents
| where Timestamp > ago(24h)
| where RegistryKey has_all ("Outlook", "HomePage") or
(RegistryKey has "Outlook" and RegistryValueName =~ "URL")
| extend DetectionType = "Outlook_HomePage_Registry"
| project Timestamp, DeviceName, AccountName, RegistryKey, RegistryValueName, RegistryValueData,
InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionType;
// Part 3: Detect Ruler usage targeting Home Page feature
let RulerHomepage = DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any ("--homepage", "ruler") and
ProcessCommandLine has_any ("homepages", "homepage", "--url")
| extend DetectionType = "Ruler_Homepage_Attack"
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine, DetectionType;
union OutlookHomePage, OutlookHomepageReg, RulerHomepage
| sort by Timestamp desc high severity
medium confidence
Data Sources
Process: Process Creation Windows Registry: Registry Value Modification Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents DeviceRegistryEvents
False Positives
- SharePoint or intranet portals configured as legitimate Outlook folder home pages by IT administrators
- Corporate Outlook customizations that load internal web dashboards in folder view
- OWA (Outlook Web Access) client features that legitimately trigger browser-related processes
- IT ticketing integrations that use Outlook Home Page to display ticket status within the email client
Last updated: 2026-04-19 Research depth: deep
References (6)
- https://attack.mitre.org/techniques/T1137/004/
- https://sensepost.com/blog/2017/outlook-home-page-another-ruler-vector/
- https://github.com/sensepost/ruler
- https://github.com/sensepost/notruler
- https://docs.microsoft.com/en-us/office365/securitycompliance/detect-and-remediate-outlook-rules-forms-attack
- https://www.fireeye.com/blog/threat-research/2019/12/breaking-the-rules-tough-outlook-for-home-page-attacks.html
Unlock Pro Content
Get the full detection package for T1137.004 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance