CyberLeveling Logo
Analyzing Phishing Emails: A Practical SOC Analyst Guide

Analyzing Phishing Emails: A Practical SOC Analyst Guide to URLs, Attachments, and Threat Intelligence

Feb 10, 2026

Phishing remains one of the most effective and widely used attack vectors in modern cyber threats. From credential harvesting to malware delivery and financial fraud, attackers rely on deceptive emails to bypass technical controls and exploit human trust.

For Security Operations Center (SOC) analysts, the ability to safely analyze phishing emails, extract relevant indicators, and determine impact is a foundational skill. This article provides a step-by-step, real-world guide to phishing analysis, combining manual techniques, automated tools, and industry best practices.

Understanding the Email Body as an Attack Vector

Once an email is flagged as suspicious, analysis should begin with the email body. This is typically where the malicious payload is delivered, either through:

  • Embedded hyperlinks
  • Malicious attachments

Attackers frequently disguise these elements using trusted branding, urgency, or social engineering techniques to encourage interaction.

Manually Extracting Hyperlinks from Emails

Before interacting with any links, analysts must extract the destination safely. The most common manual method is to:

  • Right-click the hyperlink
  • Select “Copy Link Location” or “Copy Link Address”
  • Paste the URL into a text editor for inspection

This avoids accidental execution and reveals the true destination, which is often hidden behind misleading anchor text. Links can also be extracted from HTML-formatted emails or raw email headers.

Extracting URLs Using Automated Tools

For emails containing multiple links or encoded content, automated tools can streamline extraction. Commonly used options include:

  • URL Extractor (convertcsv.com): Paste raw headers or email content to extract URLs automatically.
  • CyberChef: Use the "Extract URLs" recipe for bulk or encoded data. https://gchq.github.io/CyberChef/

A critical step after extraction is identifying the root domain of each URL. While full URLs may change frequently, root domains and infrastructure are often reused across campaigns.

Analyzing URLs and Domains for Reputation

Once URLs are extracted, their reputation and behavior must be assessed using threat intelligence and sandbox platforms.

  • ANY.RUN: An interactive sandbox allowing analysts to observe live execution of URLs and files. https://any.run/
  • Hybrid Analysis: https://hybrid-analysis.com/ Provides static and dynamic analysis with threat scoring and behavioral indicators.
  • Joe Sandbox: Enterprise-grade sandbox offering deep behavioral, network, and file analysis. https://www.joesandbox.com/

These tools help determine whether a URL leads to credential harvesting, malware delivery, or command-and-control activity.

Phishing-Specific Intelligence Platforms

  • PhishTool: phishtool.com Designed specifically for phishing investigations and SOC workflows, supporting analysis, classification, and reporting.
  • PhishTank: https://www.phishtank.com/ A community-driven phishing database useful for validating known phishing URLs and campaigns.

Analyzing Email Infrastructure and Sender Reputation

  • MXToolbox: https://mxtoolbox.com/ Used to analyze email headers, sending IP reputation, and SPF, DKIM, and DMARC configurations.
  • Spamhaus: https://www.spamhaus.org/ Provides authoritative blocklists for spam, phishing, and malware-related infrastructure.

Infrastructure analysis often reveals spoofed domains, abused mail servers, or newly registered sending hosts.

Handling and Analyzing Email Attachments Safely

If a suspicious email contains an attachment, it must be handled with care. Recommended steps include:

  • Do not open the file.
  • Save it using a secure mail client (e.g., Thunderbird).
  • Calculate its cryptographic hash.

Example SHA-256 hash generation:

sha256sum suspicious_document.doc

Hashes allow analysts to check file reputation without executing the attachment.

File Reputation and Malware Intelligence

These platforms help determine whether an attachment is a known malicious file or part of an emerging campaign.

What a SOC Analyst Should Collect During Phishing Analysis

Beyond identifying malicious content, SOC analysts must collect actionable indicators that support detection, response, and prevention.

Email Header Indicators

  • Sender and reply-to addresses
  • Display name mismatches
  • Sending IP addresses
  • Mail server chain
  • SPF, DKIM, and DMARC results
  • Timestamps and anomalies

URL and Domain Indicators

  • Full URLs and root domains
  • Subdomains and redirect chains
  • URL shorteners and embedded IPs

Attachment Indicators

  • File names and extensions
  • File type and size
  • Cryptographic hashes (SHA256)
  • Macro or script presence
  • Archive or password protection

Network & Infrastructure Indicators

  • Hosting IP addresses and ASN
  • Domain age and WHOIS data
  • TLS/SSL certificate details
  • Geolocation of infrastructure

Social Engineering Indicators

  • Impersonated brand or service
  • Urgency or fear-based language
  • Requests for credentials or payments
  • Grammar or formatting anomalies
  • Mismatch between branding and domain

Threat Intelligence Correlation

  • VirusTotal detections
  • Talos reputation scores
  • Spamhaus listings
  • PhishTank status
  • Sandbox behavioral reports

Incident Context

  • Affected user accounts
  • Time of receipt
  • Whether links were clicked
  • Whether attachments were opened
  • Credential submission confirmation

Threat Hunting After User Interaction and Remediation

When a user has already interacted with a phishing email, such as clicking a link, opening an attachment, or submitting credentials, the investigation does not stop at containment. At this stage, the SOC shifts from triage into threat hunting mode to determine whether the activity led to deeper compromise.

The goal is to identify persistence, lateral movement, or secondary payloads that may not be immediately visible.

Establishing the Scope of User Interaction

The first step is confirming exactly what actions the user took. Key questions to answer:

  • Did the user click the link or multiple links?
  • Was an attachment opened or executed?
  • Were credentials entered into a phishing page?
  • Was the interaction repeated from multiple devices or locations?

This information defines the scope of the hunt and helps prioritize systems and logs.

Endpoint Threat Hunting Activities

If a user clicked a phishing link or opened an attachment, endpoint telemetry becomes critical. Analysts should hunt for:

  • New or suspicious processes spawned after interaction
  • Command-line activity linked to script interpreters (PowerShell, cmd, wscript)
  • Files written to temporary or user-writable directories
  • Persistence mechanisms such as scheduled tasks, registry run keys, startup folders
  • Unusual parent-child process relationships

If EDR is available, analysts should pivot from the user account, timestamp of interaction, and file hash or URL. Any anomalies should be isolated and escalated immediately.

Network Threat Hunting Activities

Phishing often serves as the initial access vector for further network activity. Analysts should hunt for:

  • Outbound connections to known malicious IPs or domains
  • DNS queries to newly registered or suspicious domains
  • Beaconing behavior or repeated callback traffic
  • SSL connections with uncommon certificate issuers
  • Connections outside normal geographic patterns for the user

Network logs can reveal delayed payload retrieval or command-and-control communication that occurs hours or days after the initial click.

Identity and Authentication Threat Hunting

If credential submission is suspected or confirmed, identity-based hunting becomes a priority. Analysts should review:

  • Failed and successful login attempts after the phishing event
  • Logins from unfamiliar IP addresses or countries
  • Impossible travel scenarios
  • MFA bypass attempts or MFA fatigue activity
  • Privilege escalation or role changes

In these cases, credentials must be considered compromised until proven otherwise.

Email Environment Threat Hunting

Threat actors often reuse compromised accounts to expand access. Analysts should hunt for:

  • Suspicious inbox rules or mail forwarding rules
  • Emails sent from the affected account
  • Similar phishing emails delivered internally
  • Lookalike domains targeting other users

This step helps identify lateral phishing or internal propagation.

Remediation Actions During Threat Hunting

Threat hunting and remediation should happen in parallel when risk is confirmed. Typical remediation actions include:

  • Isolating affected endpoints
  • Forcing password resets and token revocation
  • Invalidating active sessions
  • Blocking malicious domains, URLs, and IPs
  • Removing malicious files and persistence mechanisms
  • Deleting malicious inbox rules

Remediation should always be logged and mapped to confirmed indicators.

Validation and Post-Remediation Monitoring

After remediation, analysts should continue monitoring for:

  • Reappearance of IOCs
  • Repeated login attempts
  • New outbound connections to known infrastructure
  • Reuse of previously blocked indicators

This confirms whether the threat has been fully eradicated or if the attacker retained access.

Documentation and Intelligence Feedback

Threat hunting findings should be documented clearly and shared with detection and engineering teams. Key outputs include:

  • New IOCs discovered during hunting
  • Behavioral patterns observed
  • Gaps in detection or visibility
  • Recommendations for new alerts or rules

This ensures future phishing attempts are detected earlier and handled more efficiently.

Closing Perspective

When a user has interacted with a phishing email, the incident should always be treated as a potential intrusion, not just an email security issue. Effective threat hunting bridges the gap between initial detection and full incident response, ensuring attackers do not maintain hidden access.

This mindset is what separates basic alert handling from mature SOC operations.

Best Practices for SOC Phishing Investigations

  • Never click links directly from suspicious emails.
  • Always extract and analyze URLs first.
  • Validate both full URLs and root domains.
  • Hash attachments before analysis.
  • Use multiple intelligence sources.
  • Document and share indicators with detection teams.

Closing Thoughts

Phishing analysis is not just about identifying a malicious email. It is about building intelligence, understanding attacker behavior, and strengthening defenses across the organization. While some of this is automated in mature SOCs, knowing these tools and techniques is essential. Next, we will look at how to structure a phishing incident analysis report.

Phishing Incident Analysis Report

1. Incident Overview

Incident ID: PHISH-2026-001

Date Reported: 2026-02-10

Reported By: End User / Automated Email Gateway

Analyst: SOC Analyst

Severity: High

Status: Confirmed Phishing

Summary: A suspicious email was reported by a user claiming to be from a trusted organization. Analysis confirmed the email was a phishing attempt designed to harvest user credentials through a malicious URL.

2. Email Metadata

Sender Display Name: Microsoft Security Team

Sender Email Address: support@micros0ft-secure[.]com

Reply-To Address: support@micros0ft-secure[.]com

Recipient(s): user@company.com

Subject Line: Urgent Action Required: Account Compromise

Date & Time Received: 2026-02-09 10:14 UTC

3. Header Analysis

Sending IP Address: 185.234.219.88

Sending Domain: micros0ft-secure[.]com

Return-Path: support@micros0ft-secure[.]com

Authentication Results: SPF: Fail, DKIM: Fail, DMARC: Fail

Observations: Domain impersonates a legitimate brand using character substitution. Sending IP is not associated with legitimate Microsoft infrastructure. Authentication failures indicate spoofing.

4. URL Analysis

Extracted URL: https://login.micros0ft-secure[.]com/verify/account

Reputation Checks: VirusTotal: Flagged. PhishTank: Listed. Spamhaus: Domain associated with phishing.

Root Domain: micros0ft-secure[.]com (Newly registered)

5. Attachment Analysis

Attachment Name: Account_Recovery_Form.doc

SHA256 Hash: c650f397a9193db6a2e1a273577d8d84c5668d03c06ba99b17e4f6617af4ee83

Analysis Results: Detected as malicious by VirusTotal. Contains macros consistent with malware downloaders.

6. Mitigation & Response

Actions Taken: Email quarantined. Domain and IP blocked. User notified and password reset enforced. IOCs shared with detection engineering.

7. Final Classification

Incident Type: Phishing

Phishing Category: Credential Harvesting

Threat Level: High

8. Analyst Notes

This phishing attempt relied on domain impersonation and urgency-based social engineering. While no confirmed compromise occurred in this case, the campaign demonstrates common techniques used in large-scale phishing operations. Preventive controls and user awareness remain critical.