A compromised process accessed a rare external host

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2025-11-09
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

2 Hours

Deduplication Period

1 Day

Required Data

  • Requires one of the following data sources:
    • AWS Flow Log
      OR
    • AWS OCSF Flow Logs
      OR
    • Azure Flow Log
      OR
    • Gcp Flow Log
  • Requires:
    • XDR Agent
  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Detector Tags

EDR Windows C2 Analytics

ATT&CK Tactic

Command and Control (TA0011)

ATT&CK Technique

Application Layer Protocol (T1071)

Severity

Low

Description

A compromised process accessed a rare external host.

Attacker's Goals

Communicate with the attacker's Command and Control (C2) infrastructure while leveraging a compromised process to evade detection.

Investigative actions

  • Investigate the compromised process.
  • Check the rare remote host.

Variations

A process compromised by DLL sideloading accessed a rare external host and transferred a large amount of data

Synopsis

ATT&CK Tactic

Command and Control (TA0011)

ATT&CK Technique

Application Layer Protocol (T1071)

Severity

High

Description

A process compromised by DLL sideloading accessed a rare external host and transferred a large amount of data.

Attacker's Goals

Communicate with the attacker's Command and Control (C2) infrastructure while leveraging a compromised process to evade detection.

Investigative actions

  • Investigate the compromised process.
  • Check the rare remote host.


A process compromised by DLL sideloading accessed a rare external host

Synopsis

ATT&CK Tactic

Command and Control (TA0011)

ATT&CK Technique

Application Layer Protocol (T1071)

Severity

Medium

Description

A process compromised by DLL sideloading accessed a rare external host.

Attacker's Goals

Communicate with the attacker's Command and Control (C2) infrastructure while leveraging a compromised process to evade detection.

Investigative actions

  • Investigate the compromised process.
  • Check the rare remote host.


An injected process accessed a rare external host

Synopsis

ATT&CK Tactic

Command and Control (TA0011)

ATT&CK Technique

Application Layer Protocol (T1071)

Severity

Medium

Description

An injected process accessed a rare external host.

Attacker's Goals

Communicate with the attacker's Command and Control (C2) infrastructure while leveraging a compromised process to evade detection.

Investigative actions

  • Investigate the compromised process.
  • Check the rare remote host.