A user uploaded malware to SharePoint or OneDrive

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

3 Hours

Deduplication Period

1 Day

Required Data

  • Requires:
    • Office 365 Audit

Detection Modules

Identity Threat Module

Detector Tags

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

A user uploaded a file that was classified as malware to SharePoint or OneDrive.

Attacker's Goals

An attacker may upload malware to a shared location to gain execution and move laterally.

Investigative actions

  • Look for signs that the user account is compromised (e.g. abnormal logins, unusual activity).
  • Check the file that was uploaded for any malicious indicators.
  • Follow further actions done by the account.

Variations

A user uploaded malware to SharePoint or OneDrive with suspicious characteristics

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Medium

Description

A user uploaded a file that was classified as malware to SharePoint or OneDrive with some additional suspicious characteristics.

Attacker's Goals

An attacker may upload malware to a shared location to gain execution and move laterally.

Investigative actions

  • Look for signs that the user account is compromised (e.g. abnormal logins, unusual activity).
  • Check the file that was uploaded for any malicious indicators.
  • Follow further actions done by the account.


A user uploaded a malicious payload to SharePoint or OneDrive

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

A user uploaded a file that was classified as malware to SharePoint or OneDrive. The file was labelled as malicious by Microsoft's file scanning engine.

Attacker's Goals

An attacker may upload malware to a shared location to gain execution and move laterally.

Investigative actions

  • Look for signs that the user account is compromised (e.g. abnormal logins, unusual activity).
  • Check the file that was uploaded for any malicious indicators.
  • Follow further actions done by the account.