Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
A process with high entropy and a globally uncommon hash was executed.
Attacker's Goals
Adversaries may attempt to make an executable difficult to discover or analyze by compressing, encrypting, encoding, or otherwise obfuscating its contents.
Investigative actions
Check if the process' file is either compressed, encrypted, obfuscated or packed.
Variations
Globally uncommon high entropy process was executed by a web server process or CGOGlobally uncommon high entropy process was downloaded from an uncommon source and executed