Threat Hunting
A more comprehensive search is accessible by clicking on the three dots next to the search bar:

Please note that a login is required to access the detailed search.
In this document, we showcase some of the diverse threat hunting capabilities available in the advanced search feature.
With the advanced search option, you have access to numerous fields for refining your search, including verdict, file type, hashes, YARA rules, and more.

When you click on the search button, it retrieves the reports that match your search criteria. Please note that the maximum available date interval for retrieval is three months.

Examples
Note: Since the search can take time, opening the serach examples also takes time too.
Malicious Documents
Office Files with Foreign Language and Active Content: report example, search example
Office Files using default Symmetric Key Encryption: report example, search example
Office Files utilizing the EMBED.Equation exploit: report example, search example
Office Files with Auto-Execution and Process Spawns: report example, search example
Phishing PDFs: report example, search example
Suspicious Executables
Packed PE files with process hollowing capabilities: report example, search example
PE file with a RDTSC timing instruction: report example, search example
Unusual File Types
Malicious Windows Shortcut Files spawning rundll: report example, search example
Malicious files delivered via VHD image files: report example, search example
Mobile Threats
Malicious APKs: report example, search example
APKs reading the device ID (IMEI): report example, search example
Malicious Web Threats
E-Mails containing macro-enabled attachments: report example, search example
Phishing URLs: report example, search example
Additional Resources
Threat Feed#get-feed-api-feed-atom-get