Outlook files accessed by an unsigned process

Cortex XDR Analytics Alert Reference by data source

Product
Cortex XDR
Last date published
2024-12-03
Category
Analytics Alert Reference
Order
data source

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

1 Hour

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent with eXtended Threat Hunting (XTH)

Detection Modules

Detector Tags

ATT&CK Tactic

Collection (TA0009)

ATT&CK Technique

Severity

Low

Description

An attacker may use an uncommon and unsigned process to access Outlook data files.

Attacker's Goals

Gain access to the data in the compromised mailbox.

Investigative actions

  • Examine the process command and file activity to identify the mailbox.
  • Check if the process performed any other suspicious file activity.
  • Check if the process generated network connections.