Cortex XDR Analytics Alert Reference
Cortex XDR Analytics Alert Reference
paloaltonetworks.com/documentation
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2021-2021 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
July 7, 2021
iv TABLE OF CONTENTS
Uncommon routing table listing via route.exe................................................................................ 128
Uncommon user management via net.exe.......................................................................................129
Unicode RTL Override Character....................................................................................................... 130
Unusual Lolbins Process Spawned by InstallUtil.exe.....................................................................131
Unusual process accessed the PowerShell history file................................................................. 132
Unusual weak authentication by user............................................................................................... 133
Unverified domain added to Azure AD............................................................................................ 134
User attempted to connect from a suspicious country................................................................ 135
User connected from a new country................................................................................................ 136
User successfully connected from a suspicious country.............................................................. 137
Vulnerable driver loaded...................................................................................................................... 138
Weakly-Encrypted Kerberos Ticket Requested.............................................................................. 139
Windows Installer exploitation for local privilege escalation...................................................... 140
WmiPrvSe.exe Rare Child Command Line....................................................................................... 141
Wsmprovhost.exe Rare Child Process.............................................................................................. 142
TABLE OF CONTENTS v
vi TABLE OF CONTENTS
Cortex XDR Analytics Alert Reference
The Cortex XDR Analytics Alert Reference provides a description of every Cortex XDR
Analytics Alert. Use this reference to understand what an alert means and what you should do
about it.
8 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
> TGT reuse from different hosts (pass the ticket)
> UNIX LOLBIN connecting to a rare host
> Uncommon ARP cache listing via arp.exe
> Uncommon IP Configuration Listing via ipconfig.exe
> Uncommon Service Create/Config
> Uncommon local scheduled task creation via schtasks.exe
> Uncommon net group execution
> Uncommon remote scheduled task creation
> Uncommon remote service start via sc.exe
> Uncommon routing table listing via route.exe
> Uncommon user management via net.exe
> Unicode RTL Override Character
> Unusual Lolbins Process Spawned by InstallUtil.exe
> Unusual process accessed the PowerShell history file
> Unusual weak authentication by user
> Unverified domain added to Azure AD
> User attempted to connect from a suspicious country
> User connected from a new country
> User successfully connected from a suspicious country
> Vulnerable driver loaded
> Weakly-Encrypted Kerberos Ticket Requested
> Windows Installer exploitation for local privilege escalation
> WmiPrvSe.exe Rare Child Command Line
> Wsmprovhost.exe Rare Child Process
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 9
© 2021 Palo Alto Networks, Inc.
10 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Analytics Alerts by Required Data Source
The Analytics alerts that Cortex XDR can raise depend on the data sources you integrate with Cortex XDR.
For example if the Cortex XDR agent is your only data source, the app raises only the alerts it can detect
from agent endpoint data. Some alerts can also require a combination of data sources in order to raise the
alert. Additionally, you can improve the accuracy of some Analytics alerts by adding additional data sources.
The following table displays the required data sources.
A disabled user attempted to authenticate via SSO For increased accuracy, you can
also add any of the following
optional data sources:
• Palo Alto Networks Firewall
Logs
• XDR Agent
User successfully connected from a suspicious For increased accuracy, you can
country also add the following optional
data source: Palo Alto Networks
Firewall Logs
XDR Agent
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 11
© 2021 Palo Alto Networks, Inc.
Required Data Alert Optional Data Sources
Source
Account probing —
Failed Connections —
Kerberos Traffic from Non-Standard Process For increased accuracy, you can
also add the following optional
data source: Palo Alto Networks
Firewall Logs
MSBuild Makes a Rare Network Connection For increased accuracy, you can
also add the following optional
data source: Palo Alto Networks
Firewall Logs
12 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Required Data Alert Optional Data Sources
Source
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 13
© 2021 Palo Alto Networks, Inc.
Required Data Alert Optional Data Sources
Source
Reverse SSH tunnel to external domain/ip For increased accuracy, you can
also add the following optional
data source: Palo Alto Networks
Firewall Logs
SMB Traffic from Non-Standard Process For increased accuracy, you can
also add the following optional
data source: Palo Alto Networks
Firewall Logs
Script Connecting to Rare External Host For increased accuracy, you can
also add the following optional
data source: Palo Alto Networks
Firewall Logs
14 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Required Data Alert Optional Data Sources
Source
Bronze-Bit exploit —
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 15
© 2021 Palo Alto Networks, Inc.
Required Data Alert Optional Data Sources
Source
Commonly abused AutoIT script connects to an For increased accuracy, you can
external domain also add the following optional
data source: XDR Agent
Failed Connections —
16 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Required Data Alert Optional Data Sources
Source
Recurring access to rare domain categorized as For increased accuracy, you can
malicious also add the following optional
data source: XDR Agent
Recurring rare domain access to dynamic DNS For increased accuracy, you can
domain also add the following optional
data source: XDR Agent
Cloud Logs
User successfully connected from a suspicious For increased accuracy, you can
country also add the following optional
data source: Palo Alto Networks
Firewall Logs
Palo Alto Networks Firewall Logs, XDR Agent, Corelight, or Third-Party Firewalls
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 17
© 2021 Palo Alto Networks, Inc.
Required Data Alert Optional Data Sources
Source
Port Scan —
Palo Alto Networks Firewall Logs, XDR Agent, AzureAD, Okta, or PingOne
AzureAD or Okta
SSO with abnormal operating system For increased accuracy, you can
also add the following optional
data source: XDR Agent
18 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
A disabled user attempted to authenticate via
SSO
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: AzureAD, Okta, or PingOne
For increased accuracy, you can also add any of the following optional
data sources:
• Palo Alto Networks Firewall Logs
• XDR Agent
Severity Low
Description
A disabled user attempted to authenticate via SSO.
Attacker's Goals
Use an account that was possibly compromised in the past to gain access to the network.
Investigative Actions
• See whether the service authentication was successful.
• Confirm that the activity is benign (e.g. the user returned from a long leave of absence).
• Check whether you have issues with your Directory Sync Services failing to sync data from Active
Directory.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 19
© 2021 Palo Alto Networks, Inc.
A disabled user attempted to log in
Synopsis
Severity Informational
Description
A disabled user attempted to log in.
Attacker's Goals
Use an account that was possibly compromised in the past to gain access to the network.
Investigative Actions
• See whether the authentication was successful.
• Confirm that the activity is benign (e.g. the user was recently enabled by an authorized entity).
• Check whether you have issues with your Directory Sync Services failing to sync data from Active
Directory.
20 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
A rare disabled user attempted to log in
Synopsis
Severity Low
Description
A rare disabled user attempted to log in.
Attacker's Goals
Use an account that was possibly compromised in the past to gain access to the network.
Investigative Actions
• See whether the authentication was successful.
• Confirm that the activity is benign (e.g. the user was recently enabled by an authorized entity).
• Check further actions or attempts by the user.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 21
© 2021 Palo Alto Networks, Inc.
Account probing
Synopsis
Severity Low
Description
A user failed to log in to multiple hosts it never accessed before in a short amount of time. This may indicate
the account is compromised and an attacker is probing for a host it can access with those credentials.
Attacker's Goals
Gain access to hosts by using stolen user-account credentials.
Investigative Actions
Check if the user account was compromised, and which resources it could access.
22 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Authentication Attempt From a Dormant
Account
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Low
Description
A dormant user account tried to authenticate to a service using a TGS, after having been unused for a year
or more. This may indicate the account is misused by an attacker.
Attacker's Goals
Use a compromised user account which has not been used in a long while, and are therefore less likely to be
noticed.
Investigative Actions
• See whether the service authentication was successful.
• Confirm that the activity is benign (e.g. the user returned from a long leave of absence).
• Check whether you have issues with your Directory Sync Services failing to sync data from Active
Directory.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 23
© 2021 Palo Alto Networks, Inc.
Bronze-Bit exploit
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity High
Description
A forwardable Kerberos ticket for delegation of a Protected User was observed
Attacker's Goals
Gain special user Kerberos ticket to move laterally.
Investigative Actions
• Check the initiating service account delegation privileges.
• Check the delegated account credentials and if it has high privileges.
• Check the ticket destination to verify whether it is a sensitive asset.
24 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Cached credentials discovery with cmdkey
Synopsis
Severity Low
Description
Cmdkey is a built-in Windows tool that can cache domain user credentials for use on specific target
machines, Attackers can access cached user credentials using cmdkey /list.
Attacker's Goals
Access cached user credentials.
Investigative Actions
• Check the initiator process for additional suspicious activity.
• Check if the host is a shared host that multiple users credentials can be extracted from.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 25
© 2021 Palo Alto Networks, Inc.
Commonly abused AutoIT script connects to
an external domain
Synopsis
Severity Medium
Description
AutoIT scripts have legitimate uses, but are often abused by malware to execute in a signed process
context.
Attacker's Goals
Communicate with malware running on your network to control malware activities, perform software
updates on the malware, or to take inventory of infected machines.
Investigative Actions
• AutoIT scripts have legitimate uses, but are often abused by malware to execute in a signed process
context.
• Identify the process contacting the remote domain and determine whether the traffic is malicious.
26 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Commonly abused AutoIT script drops an
executable file to disk
Synopsis
Severity Informational
Description
AutoIT scripts have legitimate uses, but are often abused by malware to execute in a signed process context
Attacker's Goals
Gain code execution on the host and evade security controls.
Investigative Actions
• Check whether the command line executed is benign or normal for the host and/or user performing it.
• Check whether the user in the command line is an administrator or other sensitive account.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 27
© 2021 Palo Alto Networks, Inc.
DNS Tunneling
Synopsis
Severity Medium
Description
10 KB or more were sent encoded in subdomain names during a 10-minute window. All subdomains
queried were under a single suspicious domain.
DNS tunneling encodes data in DNS queries and responses, allowing an attacker to bypass firewalls and
proxies to reach his or her command and control server, even when HTTP/S traffic is blocked.
The endpoint may be remotely controlled by an attacker, and/or an attacker may have exfiltrated data from
it.
Attacker's Goals
Communicate with malware running on your network to control malware activities, perform software
updates on the malware, or to take inventory of infected machines.
Investigative Actions
• Verify that the source device or process is not an approved security solution.
• Verify if the DNS query types are non-standard. DNS tunnels use uncommon query types that enable
encoding of more data. Examples include: INIT, PRIVATE, NULL, SRV, KEY, and TXT.
28 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
• If the affected endpoint is operating Windows, verify that the DNS traffic is coming from svchost.exe
and search for other processes that ran when the alert triggered. In Windows, the DNS requests go
through svchost.exe.
• Verify the responses per DNS query. Many responses per query may indicate a tool being downloaded.
• Verify the destination domain details and compare the number of endpoints in your network that access
the domain over time to see if this is an uncommonly contacted domain.
• Verify the source web-browser traffic to determine if the process was generated by user action, if the
user did not initiate the traffic it can be indicative of malicious activity.
• Verify non-DNS traffic to the domain. Any traffic other than DNS queries to the destination domain may
indicate a legitimate domain and not used solely for command-and-control or data exfiltration.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 29
© 2021 Palo Alto Networks, Inc.
Delayed Deletion of Files
Synopsis
Severity Low
Description
A command line deleting files used the time-out or ping commands to delay the file deletion. This is
suspicious, as malware sometimes use these techniques to cover their tracks.
Attacker's Goals
Evade security controls and possibly cover their tracks.
Investigative Actions
Check whether the executing process is benign, and if this was a desired behavior as part of its normal
execution flow.
30 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Discovery of host users via WMIC
Synopsis
Severity Low
Description
Attackers may use wmic.exe to list the users of a host, and potentially its owner.
Attacker's Goals
Attackers can attempt to use the command to discover host users and enumerate a huge amount of
information.
Investigative Actions
Verify whether the command that was executed is benign or normal for the host and/or user performing it
(for example, it may be an IT script).
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 31
© 2021 Palo Alto Networks, Inc.
Domain federation settings have been
modified
Synopsis
Severity Low
Description
A user or application has modified the federation settings on the domain
Attacker's Goals
An attacker attempts to change Active Directory configuration for persistence or defense evasion.
Investigative Actions
• Check what configuration has been changed.
• Check whether the user changing the configuration is permitted.
32 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Execution of a password brute-force tool
Synopsis
Severity Medium
Description
Attackers may use brute-force techniques to gain access to accounts when usernames and/or passwords
are unknown
Attacker's Goals
The attacker attempts to gain access to the account or host.
Investigative Actions
• Verify that the commands are executed from a trusted source.
• Audit the victim account or host and verify that they haven't been compromised.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 33
© 2021 Palo Alto Networks, Inc.
Execution of renamed lolbin
Synopsis
Severity Medium
Description
Lolbins can be renamed and run as a way to avoid detection
Attacker's Goals
Command execution via lolbins and detection avoidance via file rename.
Investigative Actions
Isolate the host and verify if the file is malicious or not.
34 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
External cloud storage access with unusual
user agent
Synopsis
Severity Low
Description
An identity accessed a storage resource using an unusual user agent from an external IP
Attacker's Goals
Access sensitive storage resources for data abuse or/and exfiltrating.
Investigative Actions
Check what type of data was accessed and its classification, which actions were taken, e.g. read/write/
delete and their status (success/failed), and if this user agent was involved with other identities or events.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 35
© 2021 Palo Alto Networks, Inc.
Failed Connections
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• Palo Alto Networks Firewall Logs
• XDR Agent
Severity Low
Description
The endpoint has failed connections to other endpoints that have been inactive for more than 24 hours,
or that Cortex XDR Analytics has never seen on the network. The endpoint has made an abnormally large
number of these failed connections and/or is attempting to connect to an abnormal mixture of missing or
inactive endpoints.
It is possible that your network has legitimate scanners that could cause a false positive for this alert. Cortex
XDR Analytics attempts to filter these out by checking if a scanner has been active for a long consecutive
period of time. Consequently, if this alert is seen, it represents new activity on your network.
An attacker may be trying to move laterally, or to scan different parts of the network to look for other
endpoints that expose a specific service. Worms also perform a similar activity to automatically infect
additional hosts in the network.
Attacker's Goals
An attacker does not know your network and is exploring it for new or unknown subnets.
Investigative Actions
• Validate that the source is not a sanctioned port scanner.
• Check for suspicious artifacts in the endpoint profile.
36 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Failed DNS
Synopsis
Severity Low
Description
The endpoint is performing DNS lookups that are failing at an excessively high rate when compared to
its peer group. This alert might be symptomatic of malware that is trying to connect to its command and
control (C2) servers.
The attacker's C2 server runs on one or more domains that can eventually be identified and blacklisted. To
avoid this, malware will sometimes use Domain Generation Algorithms (DGA) that produce many domain
names every day. Because only a few of these domains are ever registered, the installed malware must
blindly try to access each generated domain name in an effort to locate an active one.
Attacker's Goals
Communicate with malware running on your network to control malware activities, perform software
updates on the malware, or to take inventory of infected machines.
Investigative Actions
• Make sure your DNS servers are not misconfigured and are responsive. This detector assumes that
most DNS lookups succeed, and will only raise an alert when it sees large numbers of failed lookups.
Misconfigured or unresponsive DNS servers can result in a false positive.
• Make sure you do not have external domains configured as internal domains. This can result in clients
attempting to (for example) resolve google.com.local first, before resolving google.com. This can result in
a false-positive for this alert.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 37
© 2021 Palo Alto Networks, Inc.
• Make sure the endpoint is configured properly for your DNS servers. For example, make sure it is
configured to use the correct DNS IP address, and that the IP address is not for a firewalled DNS server.
Misconfigured DNS clients can result in many failed lookups, which will result in a false-positive for this
alert.
• Make sure the endpoint is not a DNS, Proxy, NAT or VPN gateway server. If these have been
misdetected by Cortex XDR Analytics, then their ordinary operations can trigger this alert.
38 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Failed Login For Locked-Out Account
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Low
Description
A locked-out user account (event ID 4725 or 4740) was used in a Kerberos TGT pre-authentication
attempt.
Attacker's Goals
Authenticate using the principal in the TGT, not knowing that it has been revoked.
Investigative Actions
• Check whether you have issues with your Directory Sync Services failing to sync data from Active
Directory.
• Check whether the attempt to use the principals (user accounts) specified in the alert are legitimate. For
example, a user or a script that was not updated that the account has been revoked.
• The lockout can be temporary, for example, in the case of too many login attempts, and may not be
visible after the account was released.
• Search for Windows Event Log 4740 to ascertain whether the account was locked out during the time of
the alert.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 39
© 2021 Palo Alto Networks, Inc.
Failed Login For a Long Username With Special
Characters
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Medium
Description
A long username containing special characters failed to log in to the domain.
Attacker's Goals
An attacker is trying to get code execution on internet-facing assets through command injection.
Investigative Actions
• Check the host and/or user triggering these failed attempts:
• Is the host running internet-facing services?
• Are we looking at sanction vulnerability scanning?
40 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
First SSO access from ASN for user
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: AzureAD, Okta, or PingOne
Severity Informational
Description
A user attempted to authenticate via SSO with a new ASN.
Attacker's Goals
Use an account that was possibly compromised to gain access to the network.
Investigative Actions
• See whether the service authentication was successful.
• Confirm that the activity is benign (e.g. the user has switched locations and providers).
• Verify if the ASN is an approved ASN to authenticate from.
• Follow further actions done by the user.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 41
© 2021 Palo Alto Networks, Inc.
First SSO access from ASN in organization
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: AzureAD, Okta, or PingOne
Severity Low
Description
An SSO authentication was attempted with a new ASN.
Attacker's Goals
Use an account that was possibly compromised to gain access to the network.
Investigative Actions
• See whether the service authentication was successful.
• Confirm that the activity is benign (e.g. the provider or location is allowed or a new user).
• Verify if the ASN is an approved ASN to authenticate from.
• Follow further actions done by the user.
42 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
First connection from a country in organization
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• AzureAD, Okta, or PingOne
• XDR Agent, AzureAD, or Okta
Severity Low
Description
A user connected from an unusual country that no one from this organization have connected from before.
This may indicate the account was compromised.
Attacker's Goals
Gain user-account credentials.
Investigative Actions
Check if the user is currently located in the aforementioned country, or routed its traffic there via a VPN.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 43
© 2021 Palo Alto Networks, Inc.
High Connection Rate
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs, XDR Agent, Corelight, or
Third-Party Firewalls
Severity Low
Description
The endpoint performed an unusually large number of successful connections to typically abused ports on
one or more remote endpoints.
An attacker may be trying to brute force and gain access to a resource by using different credentials or by
trying different services. In some cases, SQL injection attempts may create many sessions. Another case
may be an attacker downloading a significant amount of data from the destination.
This detection model assumes normal users do not initiate numerous connections to specific
destinations and ports, and that many users are not initiating multiple sessions to those ports
on a routine basis.
Attacker's Goals
• This alert could indicate any of the following:
• An attacker is scraping data services for useful data.
• The attacker might be seeking authentication credentials using a brute force username and password
attack against the service.
• The attacker might be using fuzz testing to look for vulnerabilities on the remote endpoint. Fuzz testing
sends unexpected, invalid, and/or random data to software. In this context, the attacker is likely using
the fuzzer in an attempt to discover buffer overflow vulnerabilities in the server.
44 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Investigative Actions
• Examine Alert Details > Overview to identify the source endpoint, process running the scan, and process
owner, to determine who or what is performing the network activity.
• Examine the endpoint profile to identify the process that is being used for the suspicious connections.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 45
© 2021 Palo Alto Networks, Inc.
Impossible traveler
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• AzureAD, Okta, or PingOne
• XDR Agent, AzureAD, or Okta
For increased accuracy, you can also add the following optional data
source: Palo Alto Networks Firewall Logs
Severity Low
Description
A user connected from multiple remote countries in a short period of time, which should normally be
impossible. This may indicate the account is compromised.
Attacker's Goals
Gain user-account credentials.
Investigative Actions
Check if the user routed their traffic via a VPN, or shared their credentials with a remote employee.
46 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Interactive local account enumeration
Synopsis
Severity Informational
Description
Multiple non-existing accounts failed to interactive local log in to a host in a short period of time. This may
indicate an attacker have physical access to the host, and is trying to enumerate accounts.
Attacker's Goals
Discover valid accounts to gain credentials.
Investigative Actions
Check if the login attempts were part of a legitimate misunderstanding of the system or part of an attack.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 47
© 2021 Palo Alto Networks, Inc.
Interactive login by a machine account
Synopsis
Severity Low
Description
A machine account performed an interactive or remote interactive login
Attacker's Goals
Use an account that has access to resources to move laterally in the network and access privileged
resources.
Investigative Actions
• See whether the login was successful.
• Check whether the account has done any administrative actions it should not usually do.
• Look for more logins and authentications by the account throughout the network.
48 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Interactive login by a service account
Synopsis
Severity Low
Description
A service account performed an interactive or remote interactive login
Attacker's Goals
Use an account that has access to resources to move laterally in the network and access privileged
resources.
Investigative Actions
• See whether the login was successful.
• Check whether the account has done any administrative actions it should not usually do.
• Look for more logins and authentications by the account throughout the network.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 49
© 2021 Palo Alto Networks, Inc.
Kerberos Pre-Auth Failures by Host
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Medium
Description
The endpoint failed an unusual number of Kerberos pre-authentications (TGT requests) from at least three
users when compared to its baseline. This can indicate a password-spraying attack.
Attacker's Goals
The attacker is attempting to gain an initial foothold in the domain using a list of valid users and a guessed
password.
Investigative Actions
• Verify whether the host that generated the alert is normally used by many users (for example, a terminal
server).
• Verify any later authentication success for the user accounts referenced by the alert, as these can
indicate the attacker managed to guess the credentials.
50 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Kerberos Pre-Auth Failures by User and Host
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Low
Description
The user account on this host failed Kerberos pre-authentications (TGT requests) an unusual number of
times. This can indicate a Kerberos brute-force attack.
Attacker's Goals
The attacker is attempting to guess the credentials for the user account.
Investigative Actions
• Verify that the password for the account has not been changed recently, without updating the user or
the program using it.
• Verify any later authentication success for the user accounts referenced by the alert, as these can
indicate the attacker managed to guess the credentials.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 51
© 2021 Palo Alto Networks, Inc.
Kerberos Traffic from Non-Standard Process
Synopsis
Severity Medium
Description
Kerberos traffic is usually performed by a standard set of privileged processes through designated ports.
The endpoint had a non-standard process communicating over ports normally used by Kerberos. An
attacker might be moving laterally by using tools that implement a custom version of the Kerberos protocol.
Attacker's Goals
• This might be symptomatic of an attacker's lateral movements. The attacker could be:
• using a custom protocol implementation that offers malicious functionality
• using a protocol other than SMB or Kerberos, but that still uses the SMB or Kerberos well-known ports.
Either way, the attacker's goal is to gain access to another endpoint on your network. The attacker could
also be surveying your network by performing service scans over the well-known SMB or Kerberos
ports.
Investigative Actions
• Make sure the process is not a scanner that implements its version of the protocol, and that the scanner
use is for sanctioned purposes. For example, nmap enumerating SMB.
• Make sure the process is not a sanctioned security product that creates standalone binaries for its use.
For example, Illusive Network honeypots.
52 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
• Investigate the process to see if the high-level language used to implement the application is the source
of the alert. Some high-level programming languages provide their protocol implementations. For
example, Java uses its Kerberos implementation.
• Examine the endpoint to see if it is infected with malware. If the parent-child chain of initiating
processes has been infiltrated with a malicious replacement, then that replacement could be known
malware.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 53
© 2021 Palo Alto Networks, Inc.
Kerberos User Enumeration
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Medium
Description
A high amount of Kerberos principal unknown errors were generated on users in the last hour. This may be
indicative of Kerberos user enumeration.
Attacker's Goals
The attacker may attempt to gain an initial foothold in the domain by enumerating users and finding service
accounts.
Investigative Actions
• Check whether any service principal names (SPNs) were not set correctly, as they will always return a
principal unknown error.
54 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
LOLBIN connecting to a rare host
Synopsis
Severity Medium
Description
A LOLBIN connected to an external IP address or host, which are rarely connected to from the organization.
Attacker's Goals
Beacon to C2 server and/or exfiltrate data.
Investigative Actions
Check whether the process was injected to or otherwise subverted for malicious use.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 55
© 2021 Palo Alto Networks, Inc.
LOLBIN spawned by an Office executable
connected to a rare external host
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• Palo Alto Networks Firewall Logs
• XDR Agent
Severity Medium
Description
A LOLBIN run by an Office process connected to an external IP address or host, which is rarely connected
to from the organization.
Attacker's Goals
Attackers may abuse Office executables to run Lolbins. This can be used for command and control or
malware dropping.
Investigative Actions
• Check the destination host reputation.
• Check if the process execution and connections are legitimate.
56 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Large Upload (FTP)
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Low
Description
The endpoint transferred an excessively large amounts of data to a single destination over FTP. That
destination server is uncommon for endpoints in your organization.
An attacker may be exfiltrating data directly to the internet.
The data limit used to trigger this alert is predetermined, and is not computed from baseline
activity seen on your network.
Attacker's Goals
Transfer data he has stolen from your network to a location that is convenient and useful to him.
Investigative Actions
• Verify that the source is not an FTP server. If Cortex XDR Analytics has failed to identify the entity as a
valid FTP server, this alert is likely to be a false positive.
• Identify the entity performing the data transfer to determine if the transfer is sanctioned.
• Use Pathfinder to interrogate the endpoint for suspicious artifacts that are using endpoint processes or
loaded modules.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 57
© 2021 Palo Alto Networks, Inc.
Large Upload (Generic)
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• Palo Alto Networks Firewall Logs
• XDR Agent
Severity Low
Description
The endpoint transferred large amounts of data to an external site using a protocol other than HTTP/s,
FTP, or SMTP. (A specific detector is used for each of those protocols.) Cortex XDR Analytics assumes
data transfers out of your network is ordinarily performed using one of those three services, so it expects
that data transfers over all other ports to be low. For the same reason, Cortex XDR Analytics also assumes
endpoint traffic towards a specific destination should be about the same over long periods of time. An
attacker may be exfiltrating data directly to the internet.
Attacker's Goals
Transfer data he has stolen from your network to a location that is convenient and useful to him.
Investigative Actions
• Check if the traffic is caused by SSH activity over that protocol, it can trigger this alert. It is possible that
someone on your network is legitimately engaged in SSH activity.
• Check if the traffic is to/from a misconfigured network.
• Check if the traffic is to a new external service or server that has recently been adopted for use by an
organization in your enterprise.
• Identify the process/user performing the data transfer to determine if the transfer is sanctioned.
58 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Large Upload (HTTPS)
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Low
Description
The endpoint transferred an excessive amount of data to an external site over HTTPS. The destination is
not a popular upload site for endpoints on your network, and the endpoint performing the upload has not
previously downloaded a large amount of data from the site. The upload is considered excessive based
on comparison to baseline measurements of HTTPS data transfers on your network. An attacker may be
exfiltrating data directly to the internet.
Attacker's Goals
Transfer data she has stolen from your network to a location that is convenient and useful to her.
Investigative Actions
• Check if this alert has been falsely triggered by DNS load balancers. If an endpoint routinely uploads data
to a site that makes use of load balancers, the transfer might ordinarily be split into multiple sessions and
across multiple subdomains, which can cause the baseline measurement to be incorrect. In that situation,
a routine upload that randomly places the bulk of the data in a single session to a single subdomain can
look excessive to the Cortex XDR Analytics detector.
• Check if the device performing the data transfer is a mobile phone performing a backup. Cortex XDR
Analytics will not always measure the baseline properly for mobile devices, especially if the backups are
performed infrequently and contain a great deal of data. If the data transfer is a mobile device running a
backup, check to ensure that only appropriate data is included in the backup.
• Identify the process/user performing the data transfer to determine if the transfer is sanctioned.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 59
© 2021 Palo Alto Networks, Inc.
Large Upload (SMTP)
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Low
Description
The endpoint, which is not an internal SMTP server, emailed an excessive amount of data from your
network.
An attacker may be exfiltrating data directly to the internet.
Attacker's Goals
Transfer data they have stolen from your network to a location that is convenient and useful to him.
Investigative Actions
• Identify the process/user performing the data transfer to determine if the transfer is sanctioned.
60 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Login Password Spray
Synopsis
Severity Low
Description
An agent tried to authenticate to an unusually high amount of user accounts within a short period of time.
This may have resulted from a login password spray attack.
Attacker's Goals
An attacker may be attempting to gain unauthorized access to user accounts.
Investigative Actions
• Check the amount of time in between each authentication attempt.
• Investigate the reason behind the login failures and if any accounts were locked out.
• Look for any successful authentication attempts and the ratio of login success versus login failures.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 61
© 2021 Palo Alto Networks, Inc.
Login by a dormant user
Synopsis
Severity Informational
Description
A dormant user logged on after having been unused for a month or longer. This may indicate the account is
misused by an attacker.
Attacker's Goals
Use a compromised user account which has not been used for a long while, and are therefore less likely to
be noticed.
Investigative Actions
• Confirm that the activity is benign (e.g. the user returned from a long leave of absence).
• See whether there are other abnormal actions done by the user (e.g. files\commands\other logins).
• Check whether you have issues with your Directory Sync Services failing to sync data from Active
Directory.
62 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
MSBuild Makes a Rare Network Connection
Synopsis
Severity Low
Description
MSBuild normally does not make any network connections. This unusual activity may be malicious since
attackers can leverage MSBuild for executing code.
Attacker's Goals
Attackers can use MSBuild to proxy execution of code.
Investigative Actions
• Check whether the execution is benign or normal for the host and/or user performing it.
• Check whether the connection is to a legitimate destination.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 63
© 2021 Palo Alto Networks, Inc.
Microsoft Office Process Spawning a
Suspicious One-Liner
Synopsis
Severity Medium
Description
A Microsoft Office process spawned a commonly abused process with a full command (not a script), a
behavior that is typically malicious.
Attacker's Goals
An attacker is trying to gain code execution on the host.
Investigative Actions
Check whether the command line executed is benign or normal for the host and/or user performing it. For
example, employees working in finance may have legitimate use cases for complex Excel commands.
64 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Microsoft Office process spawns a commonly
abused process
Synopsis
Severity Low
Description
Microsoft Office process spawns a commonly abused process with an uncommon command
Attacker's Goals
An attacker attempts to gain code execution via a phishing document.
Investigative Actions
• Check the source of the document (received by mail or loaded locally).
• Investigate the child processes for malicious activity and network connections to an external host.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 65
© 2021 Palo Alto Networks, Inc.
Mshta.exe launched with suspicious arguments
Synopsis
Severity Medium
Description
Microsoft HTML application host process has been launched with suspicious arguments which may indicate
malicious intent.
Attacker's Goals
Gain code execution on the host and evade security controls.
Investigative Actions
Check whether the executing process is benign, and if this was a desired behavior as part of its normal
execution flow.
66 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Multiple Rare Process Executions in
Organization
Synopsis
Severity Informational
Description
Multiple unusual processes were executed in the organization. This may be indicative of a compromised
account.
Attacker's Goals
Unusual processes may be executed for various purposes including exfiltration, lateral movement, etc.
Investigative Actions
Investigate the processes that were executed to determine if they were used for legitimate purposes or
malicious activity.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 67
© 2021 Palo Alto Networks, Inc.
Multiple Weakly-Encrypted Kerberos Tickets
Received
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Low
Description
A user accessed a number of services associated with user accounts in the 10 minutes leading to the alert,
generating a number of weakly encrypted Kerberos TGS (ticket granting service) tickets that is significantly
larger than the number of weakly encrypted TGS tickets received by that user in the 30 days leading to the
alert. Services associated with user accounts are a common target for Kerberoasting due to default weak
encryption.
Attacker's Goals
Crack account credentials by obtaining easy-to-crack Kerberos tickets.
Investigative Actions
Check who used the host at the time of the alert, to rule out a benign service or tool accessing those
services.
68 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Multiple discovery commands
Synopsis
Severity Low
Description
The alerted process performed multiple consecutive discovery commands in a short time frame.
Attacker's Goals
Collect information about the host, network and user configuration for lateral movement and privilege
escalation.
Investigative Actions
• Verify if the script or process initiating the discovery commands is benign.
• Verify that this isn't sanctioned IT activity.
• Look for other hosts executing similar commands.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 69
© 2021 Palo Alto Networks, Inc.
NTLM Brute Force on a Service Account
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• Palo Alto Networks Firewall Logs, XDR Agent, AzureAD, Okta, or
PingOne
• Palo Alto Networks Firewall Logs, XDR Agent, Corelight, or Third-
Party Firewalls
Severity Low
Description
A service account attempted to authenticate to a target using NTLM an excessive number of times in a
short period. * This may indicate a NTLM brute-force attack.
Attacker's Goals
The attacker attempts to gain access to the service accounts.
Investigative Actions
Verify any successful authentication by the user account referenced by the alert, as these can indicate the
attacker managed to guess the credentials.
70 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
NTLM Hash Harvesting
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• Palo Alto Networks Firewall Logs, XDR Agent, AzureAD, Okta, or
PingOne
• Palo Alto Networks Firewall Logs, XDR Agent, Corelight, or Third-
Party Firewalls
Severity Medium
Description
An unusual number of users has sent NTLM to {auth_target} in the last hour. This may be indicative of
poisoning and NTLM hash harvesting.
Attacker's Goals
The attacker may attempt to extract NTLM hashes for credential access.
Investigative Actions
• Check that the destination is not a server.
• Verify that the destination is not external to the organization.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 71
© 2021 Palo Alto Networks, Inc.
Network sniffing via command-line tool
Synopsis
Severity Medium
Description
Attackers may monitor network traffic for cleartext credentials or to learn the network's configuration.
Attacker's Goals
Gain user-account credentials.
Investigative Actions
Check whether the executing process is benign, and if this was a desired behavior as part of its normal
execution flow.
72 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
New Administrative Behavior
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs, XDR Agent, Corelight, or
Third-Party Firewalls
Severity Low
Description
The endpoint performed new administrative actions, relative to its previously profiled behavior. It is possible
that an endpoint will infrequently be used for administrative activities, so analytics is performed using logs
collected over a long period of time, also comparing the activity to that of other endpoints. That is, if many
endpoints are contacting the same destination with the same administrative activity, then this network
activity is less likely to result in this alert.
An attacker may be operating on the host, probing other computers and moving laterally inside the network
using a trusted computer and credentials. Attackers typically exhibit administrative behaviors when
performing reconnaissance and lateral movement.
Attacker's Goals
An attacker is using administrative functions to move from one endpoint to another, or to scan the network
for new endpoints to attack.
Investigative Actions
Investigate the endpoint to determine if it is legitimately being used for administrative functions.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 73
© 2021 Palo Alto Networks, Inc.
Port Scan
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs, XDR Agent, Corelight, or
Third-Party Firewalls
Severity Medium
Description
The endpoint connected, or attempted to connect, to multiple privileged ports (lower than port 1024),
which are infrequently used by other endpoints (i.e. destination ports that are normally used by many
endpoints will not raise this alert).
Attackers perform port scans for reconnaissance purposes, to find computers or servers that accept
connections in these ports, and to find vulnerable services that can be exploited.
Attacker's Goals
An attacker is determining which ports are open or closed on remote endpoints in an attempt to identify the
endpoint operating system, firewall configuration, and exploitable services.
Investigative Actions
• New endpoints that use multiple ports can cause a false positive. Ensure that the endpoint is not new
on the network, and is not hosting services such as FTP servers or domain controllers that are being
contacted for the first time.
• Check if the activity is a SYN-ACK scan. These might result in Cortex XDR Analytics detecting the scan
as coming from the wrong direction, and could mean that Cortex XDR Analytics used the wrong baseline
in triggering the alert.
• Check for port map and/or X11 usage. These usually open multiple ports. If the protocol usage for the
specific destination is sparse, Cortex XDR Analytics could raise a false alert.
74 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Possible DCShadow attempt
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs, XDR Agent, Corelight, or
Third-Party Firewalls
Severity High
Description
Attackers may register a compromised host as a new DC to get other DCs to replicate data to it, and then
push their malicious AD changes to all DCs.
Attacker's Goals
Retrieve Active Directory data, to later be able to push out malicious Active Directory changes.
Investigative Actions
Check whether the destination is a new domain controller or a host that syncs with ADFS or Azure AD.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 75
© 2021 Palo Alto Networks, Inc.
Possible DCSync Attempt
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs, XDR Agent, Corelight, or
Third-Party Firewalls
Severity Medium
Description
Attackers may pose a compromised host as a DC to replicate data to it (DCSync).
Attacker's Goals
An attacker is trying to retrieve Active Directory data.
Investigative Actions
Check whether one of the machines is a new domain controller.
76 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Possible Kerberoasting without SPNs
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Low
Description
A user specifically requested weak and deprecated encryption in a Kerberos TGS request. This provides
easy-to-crack hashes, and is typically a sign of a Kerberoasting attack. The requested service was specified
by using a suspicious SPN type, which is often used by Kerberoasting tools to request by SAN instead of
SPN.
Attacker's Goals
Crack service account credentials by obtaining an easy-to-crack Kerberos ticket.
Investigative Actions
Check who used the host at the time of the alert, to rule out a benign service or tool requesting weak
Kerberos encryption.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 77
© 2021 Palo Alto Networks, Inc.
Possible Search For Password Files
Synopsis
Severity Medium
Description
Attackers often search for files that have passwords in them.
Attacker's Goals
Gain user-account credentials.
Investigative Actions
Check whether the executing process is benign, and if this was a desired behavior as part of its normal
execution flow.
78 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Possible compromised machine account
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Medium
Description
A Kerberos TGT for machine account has been used that does not match hostname
Attacker's Goals
Gain special user Kerberos ticket to move laterally.
Investigative Actions
• Check the source host for possible credential dumping.
• Check the delegated account credentials and if it has high privileges.
• Check the ticket destination to verify whether it is a sensitive asset.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 79
© 2021 Palo Alto Networks, Inc.
PowerShell Initiates a Network Connection to
GitHub
Synopsis
Severity Low
Description
PowerShell initiates a Network Connection to GitHub with an uncommon command line. This may have
legitimate uses, but this technique is frequently used by attackers to serve malicious payloads.
Attacker's Goals
Download a second stage payload for execution.
Investigative Actions
• Check if the initiator process is malicious.
• Check for additional file/network operations by the same PowerShell instance.
80 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
PowerShell runs suspicious base64-encoded
commands
Synopsis
Severity Medium
Description
Running PowerShell with a base64-encoded payload in the command line is often used by attackers to
evade detection.
Attacker's Goals
Run general code to perform actions or download other malicious programs.
Investigative Actions
• Check if the initiator process is malicious.
• Check for other operations by the PowerShell instance.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 81
© 2021 Palo Alto Networks, Inc.
RDP Connection to localhost
Synopsis
Severity Medium
Description
RDP connection to localhost can be used for privilege escalation by leveraging Windows Accessibility
Features.
Attacker's Goals
An attacker may initiate RDP tunneling for a more convenient and stable interface.
Investigative Actions
• Identify the process/user performing RDP and check that it is authorized.
• Check whether the initiating process also connects to an external host.
82 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Random-Looking Domain Names
Synopsis
Severity Medium
Description
The endpoint performed DNS lookups to an excessively large number of apparently random root domain
names. This alert might be symptomatic of malware that is trying to connect to its command and control
(C2) servers.
The attacker's C2 server runs on one or more domains that can eventually be identified and blacklisted. To
avoid this, malware will sometimes use Domain Generation Algorithms (DGA) that produce many unique,
random-looking domain names every day. Because only a few of these domains are ever registered, the
installed malware must blindly try to access each generated domain name in an effort to locate an active
one, which may also trigger the Failed DNS alert.
Attacker's Goals
Communicate with malware running on your network to control its activities, performing software updates,
or to take inventory of infected machines.
Investigative Actions
• Make sure your DNS servers are not misconfigured and are responsive. This detector assumes that most
DNS lookups succeed, and will only raise an alert when it sees many failed lookups. Misconfigured or
unresponsive DNS servers can result in a false positive.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 83
© 2021 Palo Alto Networks, Inc.
• Make sure you do not have external domains configured as internal domains. This can result in clients
attempting to (for example) resolve google.com.local first, before resolving google.com. This can result in
a false positive for this alert.
• Ensure that the endpoint is configured properly for your DNS servers. Make sure it is configured to use
the correct DNS IP address, and that the IP address is not for a firewalled DNS server. Misconfigured
DNS clients can result in many failed lookups, which will result in a false positive for this alert.
• Make sure the endpoint is not a DNS, Proxy, NAT or VPN gateway server. If these have been
misdetected by Cortex XDR Analytics, then their ordinary operations can trigger this alert.
84 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Rare SSH Session
Synopsis
Severity Low
Description
Secure Shell (SSH) provides a secure means of remote administration. Attackers can use valid SSH
credentials and keys to remotely connect to endpoints running the SSH service.
Attacker's Goals
Secure Shell (SSH) provides a secure means of remote administration. Attackers can use valid SSH
credentials and keys to remotely connect to endpoints running the SSH service.
Investigative Actions
• Verify that the process is allowed in the organization.
• Check if the user should access the destination and whether the session was successful or not.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 85
© 2021 Palo Alto Networks, Inc.
Rare Unsigned Process Spawned by Office
Process Under Suspicious Directory
Synopsis
Severity Low
Description
Microsoft Office executed an unsigned process in a suspicious directory. This behavior is common with
malicious macros.
Attacker's Goals
Attackers execute commands after infiltrating by using phishing or exploiting a vulnerability in an office.
Investigative Actions
• Investigate the executed process.
• Investigate the document/email that initiated it.
86 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Rare WinRM Session
Synopsis
Severity Informational
Description
Windows Remote Management (WinRM) enables users to interact with remote systems in different ways,
including running executables on the remote system. WinRM sessions can be established using WinRM/
WinRS commands or programs such as PowerShell. Attackers can use WinRM to execute code and move
laterally within a compromised network.
Attacker's Goals
Windows Remote Management (WinRM) enables users to interact with remote systems in different ways,
including running executables on the remote endpoint. WinRM sessions can be established using winrm/
winrs commands or programs such as PowerShell. Attackers can use WinRM to execute code and move
laterally within a compromised network.
Investigative Actions
Investigate the endpoints participating in the session.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 87
© 2021 Palo Alto Networks, Inc.
Rare process execution by user
Synopsis
Severity Informational
Description
An unusual process was executed by a user. This may be indicative of a compromised account.
Attacker's Goals
Unusual processes may be executed for various purposes including exfiltration, lateral movement, etc.
Investigative Actions
Investigate the process that was executed to determine if it was used for legitimate purposes or malicious
activity.
88 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Rare process execution in organization
Synopsis
Severity Informational
Description
An unusual process was executed in the organization. This may be indicative of a compromised account.
Attacker's Goals
Unusual processes may be executed for various purposes including exfiltration, lateral movement, etc.
Investigative Actions
Investigate the process that was executed to determine if it was used for legitimate purposes or malicious
activity.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 89
© 2021 Palo Alto Networks, Inc.
Recurring access to rare IP
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• Palo Alto Networks Firewall Logs
• XDR Agent
Severity Low
Description
The endpoint is periodically accessing an external fixed-IP address that its peers rarely use. Access to this
external IP address has occurred repeatedly over many days. This connection pattern is consistent with
malware connecting to its command and control server for updates and operating instructions.
Attacker's Goals
Communicate with malicious code running on your network enabling further access to the endpoint and
network, performing software updates on the endpoint, or for taking inventory of infected machines.
Investigative Actions
• Identify if the IP address belongs to a reputable organization or an asset used in a public cloud.
• Identify if the source of the traffic is malware. If the source of the traffic is a malicious file, Cortex XDR
Analytics also raises a malware alert for the file on the endpoint. Malware may contact legitimate IP
addresses, therefore check for unusual apps used, or unusual ports or volumes accessed.
• View all related traffic generated by the suspicious process to understand the purpose.
• Look for other endpoints on your network that are also contacting the suspicious IP address.
• Examine file-system operations performed by the process to look for potential artifacts on infected
endpoints.
90 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Recurring access to rare domain categorized as
malicious
Synopsis
Severity Medium
Description
The endpoint is periodically connecting to an external domain (categorized as malicious) that it and its
peers rarely use. Access to this domain has occurred repeatedly over multiple days. This connection pattern
is consistent with malware connecting to its command and control server for updates and operating
instructions.
Attacker's Goals
Communicate with malware running on your network to control malware activities, perform software
updates on the malware, or to take inventory of infected machines.
Investigative Actions
• Identify the process/user contacting the remote domain and determine whether the traffic is malicious.
• Look for other endpoints on your network that are also periodically contacting the suspicious domain.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 91
© 2021 Palo Alto Networks, Inc.
Recurring rare domain access from an unsigned
process
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• Palo Alto Networks Firewall Logs
• XDR Agent
Severity Medium
Description
An unsigned process is periodically connecting to an external domain that it and its peers rarely use. Access
to this domain has occurred repeatedly over multiple days. This connection pattern is consistent with
malware connecting to its command and control server for updates and operating instructions.
Attacker's Goals
Communicate with malware running on your network to control malware activities, perform software
updates on the malware, or to take inventory of infected machines.
Investigative Actions
• Identify the process contacting the remote domain and determine whether the traffic is malicious.
• Look for other endpoints on your network that are also periodically contacting the suspicious domain.
92 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Recurring rare domain access to dynamic DNS
domain
Synopsis
Severity Medium
Description
The endpoint is periodically connecting to an external domain that it and its peers rarely use. Access to this
domain has occurred repeatedly over multiple days. This connection pattern is consistent with malware
connecting to its command and control server for updates and operating instructions.
Attacker's Goals
Communicate with malware running on your network to control malware activities, perform software
updates on the malware, or to take inventory of infected machines.
Investigative Actions
• Identify the process/user contacting the remote domain and determine whether the traffic is malicious.
• Look for other endpoints on your network that are also periodically contacting the suspicious domain.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 93
© 2021 Palo Alto Networks, Inc.
Remote account enumeration
Synopsis
Severity Medium
Description
Multiple non-existing accounts failed to remotely log in to a host in a short period of time. This may indicate
an attacker is trying to remotely enumerate accounts.
Attacker's Goals
Discover valid accounts to gain credentials.
Investigative Actions
Check if the login attempts were part of a legitimate misunderstanding of the system or part of an attack.
94 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Remote command execution via wmic.exe
Synopsis
Severity Medium
Description
Remote command execution using the Windows Management Instrumentation command-line tool.
Attacker's Goals
The attacker is expanding his reach into your network by executing commands on a remote endpoint.
Investigative Actions
• Examine Alert Details > Overview to identify the source endpoint, process running the command
execution, process owner, and execution destination.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 95
© 2021 Palo Alto Networks, Inc.
Remote service command execution from an
uncommon source
Synopsis
Severity High
Description
A remotely triggered service initiated a command execution by a host that rarely triggers services to other
remote hosts.
Attacker's Goals
Perform lateral movement to new hosts to expand the foothold within a network.
Investigative Actions
• Investigate the processes being spawned on the host for malicious activities.
• Correlate the RPC call from the source host and understand which software initiated it.
96 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Remote service start from an uncommon
source
Synopsis
Severity Low
Description
A remotely triggered service initiated by a host that rarely triggers services to other remote hosts.
Attacker's Goals
Perform lateral movement to new hosts to expand the foothold within a network.
Investigative Actions
• Investigate the service being spawned on the host for malicious activities.
• Correlate the RPC call from the source host and understand which software initiated it.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 97
© 2021 Palo Alto Networks, Inc.
Reverse SSH tunnel to external domain/ip
Synopsis
Severity Medium
Description
Reverse SSH tunnel might have been created
Attacker's Goals
Attackers may use SSH to create an encrypted tunnel to allow an attacker to covertly connect to an internal
host.
Investigative Actions
• Review the external ip/domain.
• Investigate the causality of the process.
98 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
SMB Traffic from Non-Standard Process
Synopsis
Severity Medium
Description
SMB traffic is usually performed by a standard set of privileged processes through designated ports. The
endpoint had a non-standard process communicating over ports normally used by SMB. An attacker might
be moving laterally by using tools that implement a custom version of the SMB protocol.
Attacker's Goals
• This might be symptomatic of an attacker's lateral movements. The attacker could be:
• using a custom protocol implementation that offers malicious functionality
• using a protocol other than SMB or Kerberos, but that still uses the SMB or Kerberos well-known ports.
Either way, the attacker's goal is to gain access to another endpoint on your network. The attacker could
also be surveying your network by performing service scans over the well-known SMB or Kerberos
ports.
Investigative Actions
• Make sure the process is not a scanner that implements its version of the protocol, and that the scanner
use is for sanctioned purposes. For example, nmap enumerating SMB.
• Make sure the process is not a sanctioned security product that creates standalone binaries for its use.
For example, Illusive Network honeypots.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 99
© 2021 Palo Alto Networks, Inc.
• Investigate the process to see if the high-level language used to implement the application is the source
of the alert. Some high-level programming languages provide their protocol implementations. For
example, Java uses its Kerberos implementation.
• Examine the endpoint to see if it is infected with malware. If the parent-child chain of initiating
processes has been infiltrated with a malicious replacement, then that replacement could be known
malware.
100 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
SSO authentication by a machine account
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: AzureAD, Okta, or PingOne
Severity Low
Description
A machine account attempted to authenticate via SSO
Attacker's Goals
Use an account that has access to resources to move laterally in the network and access privileged
resources.
Investigative Actions
• See whether the service authentication was successful.
• Check whether the account has done any administrative actions it should not usually do.
• Look for more logins and authentications by the account throughout the network.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 101
© 2021 Palo Alto Networks, Inc.
SSO authentication by a service account
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: AzureAD, Okta, or PingOne
Severity Low
Description
A service account attempted to authenticate via SSO
Attacker's Goals
Use an account that has access to resources to move laterally in the network and access privileged
resources.
Investigative Actions
• See whether the service authentication was successful.
• Check whether the account has done any administrative actions it should not usually do.
• Look for more logins and authentications by the account throughout the network.
102 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
SSO with abnormal operating system
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: AzureAD or Okta
For increased accuracy, you can also add the following optional data
source: XDR Agent
Severity Low
Description
A user attempted to authenticate via SSO with an abnormal operating system
Attacker's Goals
Use a legitimate user and authenticate via an SSO service to gain access to the network.
Investigative Actions
• See whether the service authentication was successful.
• Confirm that the activity is benign (e.g. the user has really moved to a new operating system).
• Follow actions and suspicious activities regarding the user.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 103
© 2021 Palo Alto Networks, Inc.
SSO with new operating system
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: AzureAD or Okta
Severity Informational
Description
A user attempted to authenticate via SSO with a new operating system
Attacker's Goals
Use a legitimate user and authenticate via an SSO service to gain access to the network.
Investigative Actions
• See whether the service authentication was successful.
• Confirm that the activity is benign (e.g. the user has really moved to a new operating system).
• Follow actions and suspicious activities regarding the user.
104 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Scrcons.exe Rare Child Process
Synopsis
Severity Low
Description
The Windows Management Instrumentation (WMI) standard event consumer scrcons.exe executed a rare
VBScript or PowerShell script. Executing a rare script can be an indication of local or remote code execution
abuse by an attacker.
Attacker's Goals
The attacker is trying to gain Persistence via WMI script registration.
Investigative Actions
Review registered WMI ActiveScriptEventConsumer.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 105
© 2021 Palo Alto Networks, Inc.
Script Connecting to Rare External Host
Synopsis
Severity Medium
Description
Scripts connecting to external IP addresses may be sanctioned IT scripts. However, when those external IP
addresses are only receiving connections from a few specific endpoints in the organization, these scripts
may be an indicator of more suspicious activity. Security testers and adversaries use offensive frameworks
that employ forms of scripting which result in this type of network activity.
Attacker's Goals
Connect its Command and Control server.
Investigative Actions
• Check the external host the script connects to.
• Fetch and investigate the executed script.
106 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Spam Bot Traffic
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Low
Description
The endpoint connected to an excessive number of external SMTP servers. A spambot may be trying to
send spam email using multiple SMTP servers. Spambots can cause your domain to be blacklisted, and can
contain other malicious functionality. The same mechanism can also be used for exfiltration. Some VPN
clients can also tunnel data over SMTP. Note: This detection model looks for SMTP connections to external
servers, but the volume of traffic is not considered. A count is performed based on the number of domains
being contacted, as well as the number of unresolved IP addresses.
Attacker's Goals
The attacker uses the host as an SMTP client to send mails and hide their real origin.
Investigative Actions
• Verify that the source is not an SMTP server. If Cortex XDR Analytics has failed to identify the process
as a valid SMTP server, this alert will be a false positive.
• Verify that IP addresses are actually not being resolved by the non-SMTP process. If the process is
performing DNS resolution with a DNS service outside your network, it is possible (depending on your
network topology) that Cortex XDR Analytics will not observe that traffic. Because SMTP services
typically use numerous IP addresses, this situation could cause a process to exceed a limit when it would
otherwise fail to do so.
• If the SMTP connection activity proves to be the result of malicious file activity, search in the Triage
page for other endpoints infected with the file.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 107
© 2021 Palo Alto Networks, Inc.
Sudoedit Brute force attempt
Synopsis
Severity Medium
Description
An unusual amount of sudoedit commands executed in a short period of time. This may indicate an attempt
to exploit CVE-2021-3156.
Attacker's Goals
The attacker may gain higher privileges via exploitation of sudoedit.
Investigative Actions
• Verify that the current version of sudo in not vulnerable to CVE-2021-3156.
108 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Suspicious PowerShell Command Line
Synopsis
Severity Low
Description
Attackers often leverage PowerShell one-liners, in which PowerShell is executed with suspicious options on
the command line
Attacker's Goals
Gain code execution on the host.
Investigative Actions
Check whether the command line executed is benign or normal for the host and/or user performing it. For
example, the command line may be an administrative script.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 109
© 2021 Palo Alto Networks, Inc.
Suspicious PowerShell Enumeration of Running
Processes
Synopsis
Severity Low
Description
Attackers often enumerate running processes to find and disable security tools.
Attacker's Goals
Understand the type of host according to the processes running on it; find and disable security tools.
Investigative Actions
Verify whether the command that was executed is benign or normal for the host and/or user performing it
(for example, it may be an IT script).
110 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Suspicious Process Spawned by Adobe Reader
Synopsis
Severity Low
Description
Unusual process spawned by Adobe Reader with an uncommon command line
Attacker's Goals
An attacker attempts to gain code execution via a phishing document.
Investigative Actions
• Check the source of the document (received by mail or loaded locally).
• Investigate the child processes for malicious activity and network connections to an external host.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 111
© 2021 Palo Alto Networks, Inc.
Suspicious Process Spawned by wininit.exe
Synopsis
Severity Medium
Description
An unusual process was spawned by wininit.exe, possibly indicating malicious local or remote code
execution.
Attacker's Goals
Gain code execution on the host.
Investigative Actions
Check whether the executing process is benign, and if this was a desired behavior as part of its normal
execution flow.
112 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Suspicious RunOnce Parent Process
Synopsis
ATT&CK Technique Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
(T1547.001)
Severity Low
Description
Runonce.exe executes commands under the Registry key HKLM\SOFTWARE\Microsoft\Windows
\CurrentVersion\RunOnce, typically on computer boot and user login events.
Attacker's Goals
An attacker is trying to perform an action on the system at a later point, achieving persistence.
Investigative Actions
Investigate the endpoint to determine if it's a legitimate process that is supposed to use RunOnce in its
operation.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 113
© 2021 Palo Alto Networks, Inc.
Suspicious SSO access from ASN
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: AzureAD, Okta, or PingOne
Severity Low
Description
A suspicious SSO authentication attempt was made by a user.
Attacker's Goals
Use an account that was possibly compromised to gain access to the network.
Investigative Actions
• See whether the service authentication was successful.
• Confirm that the activity is benign (e.g. the user has switched locations and providers).
• Verify if the ASN is an approved ASN to authenticate from.
• Follow further actions done by the user.
114 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Suspicious disablement of the Windows
Firewall
Synopsis
Severity Medium
Description
The Windows Firewall has been disabled. Malware may turn it off to exfiltrate data and communicate with
C2 servers.
Attacker's Goals
An attacker may turn the firewall off to exfiltrate data and communicate with C2 servers.
Investigative Actions
• Check whether the command line executed is benign or normal for the host and/or user performing it.
• Investigate the endpoint to determine if the process is legitimately disabling the firewall.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 115
© 2021 Palo Alto Networks, Inc.
Suspicious dump of ntds.dit using Shadow
Copy with ntdsutil/vssadmin
Synopsis
Severity High
Description
Attackers may attempt to dump the ntds.dit file, which stores all Active Directory account information, to
later extract passwords and hashes from it.
Attacker's Goals
Retrieve Active Directory data, to perform malicious activities such as lateral movement.
Investigative Actions
Check the initiator process for additional suspicious activity.
116 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Suspicious process accessed a site
masquerading as Google
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• Palo Alto Networks Firewall Logs
• XDR Agent
Severity Low
Description
Suspicious process accessed a site masquerading as Google
Attacker's Goals
Masquerade legitimate looking Google services for defense evasion and C&C.
Investigative Actions
• See whether this site has a malicious reputation.
• Follow process activities.
• Monitor traffic to the site.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 117
© 2021 Palo Alto Networks, Inc.
Suspicious process execution by scheduled
task
Synopsis
Severity Low
Description
An unpopular unsigned process was executed by a scheduled task
Attacker's Goals
Attackers may attempt to gain persistence on the endpoint using scheduled tasks.
Investigative Actions
• Review the process executed by the schedule task.
• Investigate the specific scheduled task execution chain.
118 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
TGT reuse from different hosts (pass the ticket)
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
ATT&CK Technique Use Alternate Authentication Material: Pass the Ticket (T1550.003)
Severity Low
Description
We observed two different hosts sending TGS using the same TGT. This may indicate a TGT was stolen and
passed to another host.
Attacker's Goals
Lateral movement using stolen user-account credentials.
Investigative Actions
Check if the mentioned hosts are not the same, and investigate if the ticket was stolen from one of them.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 119
© 2021 Palo Alto Networks, Inc.
UNIX LOLBIN connecting to a rare host
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• Palo Alto Networks Firewall Logs
• XDR Agent
Severity Informational
Description
A UNIX LOLBIN connected to an external IP address or host, which is rarely connected to from the
organization.
Attacker's Goals
Beacon to C2 server and/or exfiltrate data.
Investigative Actions
Check whether the process was injected to or otherwise subverted for malicious use.
120 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Uncommon ARP cache listing via arp.exe
Synopsis
Severity Low
Description
The arp.exe command is used to display and modify entries in the Address Resolution Protocol (ARP) cache.
Adversaries may attempt to use the command to discover remote systems they could compromise.
Attacker's Goals
Adversaries may attempt to use the command to discover remote systems they could compromise.
Investigative Actions
Check whether the initiating process is allowed in your organization. (If the parent process is cmd.exe, check
the process that spawned it).
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 121
© 2021 Palo Alto Networks, Inc.
Uncommon IP Configuration Listing via
ipconfig.exe
Synopsis
Severity Low
Description
The 'ipconfig' command is used to display TCP/IP network configuration information and refresh the
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Adversaries may
use the command to discover network configuration details.
Attacker's Goals
Attackers can use the ipconfig command to discover network configuration details.
Investigative Actions
• Check whether the initiator process is benign or normal for the host and/or user performing it.
• Check whether additional discovery commands were executed from the same process.
122 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Uncommon Service Create/Config
Synopsis
Severity Medium
Description
The Service Control command (sc.exe) is used to create, start, stop, query, or delete Windows services.
Adversaries may attempt to use the command to execute and persist a binary, command, or script.
Attacker's Goals
Evading security controls and possibly persisting malware.
Investigative Actions
Check whether the service created, or the configuration change to an existing service, is benign or normal
for the host and/or user performing it.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 123
© 2021 Palo Alto Networks, Inc.
Uncommon local scheduled task creation via
schtasks.exe
Synopsis
Severity Low
Description
The schtasks.exe command enables creating, deleting, querying, changing, running, and ending scheduled
tasks on a local or remote computer. Adversaries may attempt to use the command to gain persistence on
this host using scheduled tasks.
Attacker's Goals
Attackers may attempt to use the command to gain persistence on the endpoint using scheduled tasks.
Investigative Actions
• Review the process that creates the schedule task.
• Investigate the specific scheduled task execution chain.
124 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Uncommon net group execution
Synopsis
Severity Medium
Description
The 'net group' command is used to add, display, or modify domain-level groups. Adversaries may attempt
to use the command to find domain-level groups and permissions settings or modify domain-level group
memberships.
Attacker's Goals
Attackers may attempt to use the command to find domain-level groups and permissions settings or modify
domain-level group memberships.
Investigative Actions
• Check if the queried group is a sensitive one (e.g. administrators).
• Check whether the initiating process has executed additional discovery commands.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 125
© 2021 Palo Alto Networks, Inc.
Uncommon remote scheduled task creation
Synopsis
Severity High
Description
The schtasks.exe command enables creating, deleting, querying, changing, running, and ending scheduled
tasks on a local or remote computer. Adversaries may attempt to use the command to execute programs or
persist malware on remote machines.
Attacker's Goals
Attackers can attempt to use the command to execute programs or persist malware on remote endpoints.
Investigative Actions
• Investigate the initiator process and whether it should create remote tasks.
• Investigate the scheduled task execution on the remote machine.
126 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Uncommon remote service start via sc.exe
Synopsis
Severity Low
Description
The Service Control command (sc.exe) is used to create, start, stop, query, or delete Windows services.
Adversaries may attempt to use the command to execute and persist a binary, command, or script.
Attacker's Goals
The Service Control command is used to create, start, stop, query, or delete Windows services. Attackers
can use the command to attempt to execute and persist a binary, command, or script.
Investigative Actions
• Check whether the executed process is benign and if this was desired behavior as part of its normal
execution flow.
• Check the remote host for any evidence of the executed service and investigate it.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 127
© 2021 Palo Alto Networks, Inc.
Uncommon routing table listing via route.exe
Synopsis
Severity Low
Description
The route.exe command is used to display and modify entries in the local IP routing table. Adversaries may
attempt to use the command to discover remote systems they could compromise.
Attacker's Goals
Attackers can attempt to use the command to discover remote systems they could compromise.
Investigative Actions
Check whether the command line executed is benign or normal for the host and/or user performing it (e.g.
an IT script).
128 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Uncommon user management via net.exe
Synopsis
Severity Low
Description
The net.exe command is used to add, delete, and otherwise manage the users on a computer. Adversaries
may attempt to use the command to discover or add local and domain user accounts.
Attacker's Goals
Attackers may attempt to use the command to discover or add local and domain user accounts. The created
accounts are to gain additional access to endpoints within your network.
Investigative Actions
• Check whether the command line executed is benign or normal for the host and/or user performing it.
• Check whether the user in the command line is an administrator or other sensitive account.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 129
© 2021 Palo Alto Networks, Inc.
Unicode RTL Override Character
Synopsis
Severity Medium
Description
An attacker may use a special right-to-left (RTL) override character to trick users into executing malicious
files that look like benign file types.
Attacker's Goals
Trick users into executing malicious files by making their file types seem benign.
Investigative Actions
Investigate the executed process causality group. There is no reason for benign files to contain the Unicode
right-to-left override character in their name.
130 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Unusual Lolbins Process Spawned by
InstallUtil.exe
Synopsis
Severity Low
Description
An unusual process was spawned by InstallUtil.exe, possibly indicating malicious local or remote code
execution.
Attacker's Goals
Gain code execution on the host.
Investigative Actions
Check whether the executing process is benign, and if this was a desired behavior as part of its normal
execution flow.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 131
© 2021 Palo Alto Networks, Inc.
Unusual process accessed the PowerShell
history file
Synopsis
Severity Low
Description
An abnormal process accessed the PowerShell console history file. This may be a sign of malicious
PowerShell execution without directly invoking the powershell.exe binary.
Attacker's Goals
An attacker is attempting to run PowerShell without powershell.exe to evade detection.
Investigative Actions
• Investigate the process and command line executed and whether it's benign or normal for this host.
132 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Unusual weak authentication by user
Synopsis
Severity Informational
Description
A user account authenticated to a host via NTLMv1 or LM authentication for the first time in the past 30
days. This may be indicative of an NTLM downgrade attack A downgrade attack may force the client to
authenticate with a weaker hash/protocol (such as NTLMv1 or even LM) instead of NTLMv2.
Attacker's Goals
The attacker attempts to gain access to the accounts.
Investigative Actions
• Audit all login events with a weaker protocol and review any anomalous usage.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 133
© 2021 Palo Alto Networks, Inc.
Unverified domain added to Azure AD
Synopsis
Severity Low
Description
A new unverified domain has been added to Azure AD
Attacker's Goals
An attacker attempts to change Active Directory configuration for persistence or defense evasion.
Investigative Actions
• Check if the new domain is known for the organization.
• Check whether the user changing the configuration is permitted.
134 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
User attempted to connect from a suspicious
country
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• AzureAD, Okta, or PingOne
• XDR Agent, AzureAD, or Okta
Severity Informational
Description
A user connected from an unusual country. This may indicate the account was compromised.
Attacker's Goals
Gain user-account credentials.
Investigative Actions
Check if the user is currently located in the aforementioned country, or routed its traffic there via a VPN.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 135
© 2021 Palo Alto Networks, Inc.
User connected from a new country
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• AzureAD, Okta, or PingOne
• XDR Agent, AzureAD, or Okta
Severity Informational
Description
A user connected from an unusual country that the user has not connected from before. This may indicate
the account was compromised.
Attacker's Goals
Gain user-account credentials.
Investigative Actions
Check if the user is currently located in the aforementioned country, or routed its traffic there via a VPN.
136 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
User successfully connected from a suspicious
country
Synopsis
Required Data Cortex XDR can raise this alert from the following combinations of data
sources:
• AzureAD, Okta, or PingOne
• XDR Agent, AzureAD, or Okta
For increased accuracy, you can also add the following optional data
source: Palo Alto Networks Firewall Logs
Severity Low
Description
A user successfully connected from an unusual country. This may indicate the account was compromised.
Attacker's Goals
Gain user-account credentials.
Investigative Actions
Check if the user is currently located in the aforementioned country, or routed its traffic there via a VPN.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 137
© 2021 Palo Alto Networks, Inc.
Vulnerable driver loaded
Synopsis
Severity Medium
Description
A new and uncommon driver that is vulnerable was loaded. Attackers may install a legitimate kernel driver
and exploit its vulnerability to gain kernel access.
Attacker's Goals
Gain code execution on the host kernel.
Investigative Actions
• Check whether the driver was installed by IT / User.
• Check if the host has the device of the driver - driver for Lenovo and the PC host brand is Asus.
• Check driver file creation time and if in that time legitimate operations occur.
138 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
Weakly-Encrypted Kerberos Ticket Requested
Synopsis
Required Data Cortex XDR can raise this alert from the following combination of data
sources: Palo Alto Networks Firewall Logs or XDR Agent
Severity Low
Description
A user specifically requested weak and deprecated encryption in a Kerberos TGS request. This provides
easy-to-crack hashes, and is typically a sign of a Kerberoasting attack.
Attacker's Goals
Crack account credentials by obtaining an easy-to-crack Kerberos ticket.
Investigative Actions
Check who used the host at the time of the alert, to rule out a benign service or tool requesting weak
Kerberos encryption.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 139
© 2021 Palo Alto Networks, Inc.
Windows Installer exploitation for local
privilege escalation
Synopsis
Severity Medium
Description
The Windows installer (msiexec.exe) was likely exploited to run a malicious rollback script (.rbs file) instead
of the original. Users should not be able to modify config.msi during the installation process, only SYSTEM
should have access to it.
Attacker's Goals
An attacker is attempting to gain SYSTEM privileges.
Investigative Actions
• Investigate the actor process SID and path and whether it's benign or normal for this host.
• This action is not common, but allowed on Windows versions older than Windows 8. On those systems,
check the file reputation for both the CGO and OS actor executables that ran the installation.
140 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference
© 2021 Palo Alto Networks, Inc.
WmiPrvSe.exe Rare Child Command Line
Synopsis
Severity Medium
Description
A remote WMI command executed a binary proxy, the Windows Management Instrumentation (WMI)
Provider Host wmiprvse.exe, which executed a rare child command line. Executing a rare child process can
be an indication of remote code execution abuse by an attacker.
Attacker's Goals
Gain code execution on a remote host.
Investigative Actions
• Investigate the processes being spawned from WmiPrvse.exe on the host for malicious indicators.
• Correlate the RPC call from the source host and understand what initiated it.
CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference 141
© 2021 Palo Alto Networks, Inc.
Wsmprovhost.exe Rare Child Process
The Wsmprovhost.exe Rare Child Process alert indicates a remote WMI command executed a binary proxy,
which executed a rare child process which can indicate remote code execution abuse by an attacker.
Synopsis
Severity Low
Description
The PowerShell host wsmprovhost.exe is a proxy process executed remotely through PowerShell when
using Windows Remote Management (WinRM). It has executed a rare child process, which may indicate
remote code execution abuse by an attacker.
Attacker's Goals
Gain code execution on a remote host.
Investigative Actions
• Investigate the processes being spawned from Wsmprovhost.exe on the host for malicious indicators.
• Correlate the initiator process (most likely PowerShell) to the source host and investigate it.
142 CORTEX XDR™ ANALYTICS ALERT REFERENCE | Cortex XDR Analytics Alert Reference