alertId stringclasses 278 values | providerAlertId stringclasses 278 values | incidentId int64 486 989 ⌀ | serviceSource stringclasses 2 values | creationTime stringdate 2022-09-30 05:04:51 2023-01-24 06:03:50 ⌀ | lastUpdatedTime stringdate 2022-11-12 01:35:42 2023-01-24 06:05:47 ⌀ | resolvedTime stringclasses 23 values | firstActivity stringdate 2022-09-07 09:25:00 2023-01-24 05:31:07 ⌀ | lastActivity stringdate 2022-09-30 05:00:00 2023-01-24 05:43:53 ⌀ | title stringclasses 62 values | description stringclasses 51 values | category stringclasses 12 values | status stringclasses 2 values | severity stringclasses 4 values | investigationId int64 20 64 ⌀ | investigationState stringclasses 9 values | classification stringclasses 1 value | determination stringclasses 1 value | detectionSource stringclasses 7 values | detectorId stringclasses 48 values | assignedTo stringclasses 3 values | actorName stringclasses 1 value | threatFamilyName stringclasses 6 values | mitreTechniques listlengths 0 8 ⌀ | devices listlengths 1 6 ⌀ | entities listlengths 0 49 ⌀ | entityType stringclasses 2 values | evidenceCreationTime stringclasses 469 values | verdict stringclasses 5 values | remediationStatus stringclasses 2 values | accountName stringclasses 30 values | domainName stringclasses 17 values | userSid stringclasses 22 values | aadUserId stringclasses 8 values | userPrincipalName stringclasses 14 values | sha1 stringclasses 28 values | sha256 stringclasses 27 values | fileName stringclasses 21 values | filePath stringclasses 13 values | processId int64 0 20.7k ⌀ | processCommandLine stringclasses 67 values | processCreationTime stringclasses 133 values | parentProcessId int64 0 14.6k ⌀ | parentProcessCreationTime stringclasses 63 values | parentProcessFileName stringclasses 14 values | parentProcessFilePath stringclasses 11 values | detectionStatus stringclasses 1 value | deviceId stringclasses 9 values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
da638043438036201520_-52805994 | e2a21b0e-adc0-427f-a594-24892fe8b740 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T04:50:03.6201707Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T04:48:54.6162888Z | 2022-11-18T04:48:54.6162888Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "tmtower-book",
"firstSeen": "2022-10-10T06:18:04.255Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Takeshi",
"domainName": "TMTOWER-BOOK"
}
],
"mdatpDeviceId":... | [
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": null,
"deviceId": null,
"domainName": "TMTOWER-BOOK",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T04:50:03.6566667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreat... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072962520261219_-35896655 | 8db98b94-6f48-4a07-b860-36675274a484 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:57:32.0261516Z | 2022-12-22T09:01:34.4133333Z | null | 2022-12-22T08:47:29.8275995Z | 2022-12-22T08:59:36.3706452Z | 'Kekeo' malware was detected during lateral movement | 'DefenderObservation.ThreatFamily' malware was detected on this device. An attacker might be attempting to move laterally to this device from another device on the network. | LateralMovement | New | Medium | 62 | PendingApproval | null | null | WindowsDefenderAtp | 7a6f0432-57d7-4a96-a286-0bd733ea425d | null | null | null | [
"T1543.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "On... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:57:32.0566667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:18:39.2366667Z | Suspicious | None | ronhd | evilcorp.cn | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:34.4433333Z | Suspicious | None | jeff | lab.net | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:15:08.9233333Z | Malicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 4,064 | "powershell.exe" | 2022-09-30T06:11:13.210308Z | 4,668 | 2022-08-23T12:17:37.8693453Z | explorer.exe | C:\Windows | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:03:43.66Z | Suspicious | None | jeff | corp.local | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2023-01-24T05:33:51.7933333Z | Suspicious | None | root | DIYTESTMACHINE | S-1-5-21-4215714199-1288013905-3478400915-1002 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043450911419285_2079932152 | e2aacca3-bd0e-4192-9c49-f32c9ab8d30c | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:11:31.1419497Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:10:00.653487Z | 2022-11-18T05:14:14.5635165Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | 47 | PartiallyInvestigated | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:11:31.19Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:12:05.72Z | Suspicious | None | admin | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930236864359_-743961971 | 479e0b88-c4a8-4b82-8d31-90abda7894c1 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:43.686456Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T01:55:47.8840459Z | 2022-11-21T02:32:54.3762442Z | Suspicious sequence of exploration activities | A process called a set of windows commands. These commands can be used by attackers in order to identify assets of value and coordinate lateral movement after compromising a machine. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | acfdcbd1-cf72-47be-8e52-6cadc507656d | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1016",
"T1018",
"T1033",
"T1049",
"T1087",
"T1087.001",
"T1135"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:43.73Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
aa0bf3e5da-67d0-4cd4-a60c-d1ec8b17906e | 0bf3e5da-67d0-4cd4-a60c-d1ec8b17906e | 765 | MicrosoftDefenderForIdentity | 2022-11-21T02:07:45.9143894Z | 2022-11-26T01:38:29.64Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:01:35.967662Z | 2022-11-21T02:05:28.399996Z | Suspected overpass-the-hash attack (Kerberos) | Ron Henderson (Helpdesk Administrator) on MSDXV2-Win10V successfully authenticated against MSDXV2-DC. | DefenseEvasion | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | AzureATP | AbnormalKerberosOverpassTheHashSecurityAlert | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1550",
"T1550.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild":... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:07:46.14Z",
"fileName": null,
"filePath": null,
"ipAddress":... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:28:42.24Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,044 | copy con test.txt | 2022-11-11T08:17:06.3382251Z | 4,704 | 2022-11-11T08:16:44.2952776Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-16T08:31:10.5066667Z | Suspicious | None | analyst | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1109 | 34a6a005-fc93-42dc-ae87-352d3e9921c4 | jesse@msdxv2.m365dpoc.com | 34f6168251ce3ed625e9b8d26b0ce5dad7421dbe | 20a100ad633bd79474edcc3736eefc395d39f7d5904c46ddb96593316ce6b262 | SystemSettingsAdminFlows.exe | C:\Windows\System32 | 540 | "SystemSettingsAdminFlows.exe" Defender SubmitSamplesConsent 0 | 2022-11-16T08:30:20.1839033Z | 4,704 | 2022-11-16T07:26:02.7983467Z | SystemSettings.exe | C:\Windows\ImmersiveControlPanel | Detected | 7114973b832b32d349815a5d2811738cc10fa650 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:30:16.59Z | Suspicious | None | darol | test.domain | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-13T13:28:05.53Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:38.9833333Z | Suspicious | Active | analyst | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 3,844 | PSEXESVC.exe | 2022-11-11T08:17:34.3184356Z | 632 | 2022-11-11T08:13:27.8223756Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-16T16:01:04.1333333Z | Unknown | None | system | null | S-1-5-18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T04:44:38.9333333Z | Suspicious | None | Takeshi | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:14:46.34Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 11,068 | whoami /all | 2022-09-30T06:11:53.2107428Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638043434743822283_-760776779 | d213d12e-ec6a-464e-b4f3-4851f9b62677 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T04:44:34.3822445Z | 2022-11-21T04:45:09.4866667Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T04:38:44.385545Z | 2022-11-18T04:38:53.3463255Z | Multiple dual-purpose tools were dropped | Multiple known public tools, which could also be used for malicious reasons were dropped on this device.
Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement. | LateralMovement | Resolved | High | 46 | TerminatedBySystem | TruePositive | SecurityTesting | WindowsDefenderAtp | e0e0ea40-b5ca-4cbf-8380-24119951f847 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1021",
"T1105",
"T1555",
"T1558.003",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "corp.local",
"firstSeen": "2022-10-10T06:18:04.255Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Takeshi",
"domainName": "TMTOWER-BOOK"
}
],
"mdatpDeviceId": "... | [
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": null,
"deviceId": null,
"domainName": "TMTOWER-BOOK",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T04:44:34.5966667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreat... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:20:49.52Z | Suspicious | None | svc_acct | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T04:50:04.1566667Z | Suspicious | None | Takeshi | internal.corp | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153088730569_1093802277 | 0cf8fa01-8fbb-4476-a8df-1514deded2ec | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:15:08.8730773Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:10:55.1361741Z | 2022-09-30T06:11:51.5727687Z | Suspicious RDP session | A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives. | SuspiciousActivity | Resolved | High | 20 | TerminatedBySystem | TruePositive | SecurityTesting | WindowsDefenderAtp | e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534... | [
{
"aadUserId": null,
"accountName": "MSDXV2-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:15:08.9233333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCrea... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638066012599386025_543146038 | 0bfa195d-7fcb-4c7c-bb2b-be226318ad32 | 794 | MicrosoftDefenderForEndpoint | 2022-12-14T07:54:19.938631Z | 2022-12-14T08:00:01.6766667Z | null | 2022-12-14T07:42:43.5926544Z | 2022-12-14T07:42:43.5926544Z | 'Encryptest' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | New | Medium | 60 | PendingApproval | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | null | null | Encryptest | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "tmtower-win10b.tmtower.m365dpoc.com",
"firstSeen": "2022-12-14T07:32:33.6902425Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "8d6414f0fc6bf2196d54aab4207d4a65873315c6",
"onboardingStatus": "... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "8d6414f0fc6bf2196d54aab4207d4a65873315c6",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-14T07:54:19.98Z",
"fileName": "UNSIGNED_ransomware_test_exe.exe",
"filePath... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:35.09Z | Suspicious | None | ronhd | test.domain | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:18:14.6166667Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 5,344 | "mimikatz.exe" privilege::debug "lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export" exit | 2022-11-11T08:17:36.0206318Z | 4,704 | 2022-11-11T08:16:44.2952776Z | powershell.exe | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638072958472701689_-563268025 | 9889b340-9a4a-43d9-8023-6c7f714f5e6a | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:50:47.270188Z | 2022-12-22T09:03:14.7633333Z | null | 2022-12-22T08:28:11.2789495Z | 2022-12-22T08:47:53.8002928Z | Suspicious sequence of exploration activities | A process called a set of windows commands. These commands can be used by attackers in order to identify assets of value and coordinate lateral movement after compromising a machine. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | acfdcbd1-cf72-47be-8e52-6cadc507656d | null | null | null | [
"T1016",
"T1018",
"T1049",
"T1069.001",
"T1069.002",
"T1087",
"T1087.001",
"T1135"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDev... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:50:47.2866667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime":... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638041865105979370_382804972 | 25d9dfec-e488-44ad-b1dd-472b4578a73a | 730 | MicrosoftDefenderForEndpoint | 2022-11-16T09:08:30.5979613Z | 2022-11-19T01:35:44.2066667Z | 2022-11-19T01:35:44.1866667Z | 2022-11-16T09:05:41.3077996Z | 2022-11-16T09:05:41.3077996Z | Attempt to turn off Microsoft Defender Antivirus protection | An attempt was made to turn off a protection feature in Microsoft Defender Antivirus. An attacker might be trying to evade detection. | DefenseEvasion | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | ac5d5f4f-fab6-41d4-b1b0-552f3c51cea1 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1562.001"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "M... | [
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": null,
"deviceId": null,
"domainName": "NT AUTHORITY",
"entityType": "User",
"evidenceCreationTime": "2022-11-16T09:08:30.79Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTim... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:24:38.03Z | Benign | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:23.9066667Z | Suspicious | None | jeff | evilcorp.cn | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T05:19:15.88Z | Suspicious | None | guest | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:45.93Z | Suspicious | None | jeff | corp.local | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:53.9566667Z | Suspicious | None | jeff | corp.local | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072970422431887_-1103735379 | dd44b653-cbb4-4925-87a9-a403d1e588b5 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T09:10:42.2432103Z | 2022-12-22T09:11:25.2633333Z | null | 2022-12-22T09:05:21.3317297Z | 2022-12-22T09:08:59.147227Z | Suspicious Process Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | null | null | null | [
"T1057",
"T1059.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboar... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T09:10:42.28Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152308827480_-286400086 | 636277db-9b37-411e-b2de-ba2a60f61c07 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:13:50.8827674Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:13:08.3651044Z | 2022-09-30T06:13:08.3651044Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:13:50.9266667Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045935981936949_-814125345 | 1c163e80-5ce7-48cd-b956-51bf761fd951 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:13:18.1937163Z | 2022-11-21T02:21:59.99Z | null | 2022-11-21T02:01:54.5564455Z | 2022-11-21T02:20:27.5631555Z | 'Kekeo' malware was prevented | Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Malware | New | Informational | 49 | PendingApproval | null | null | WindowsDefenderAv | d60f5b90-ecd8-4d77-8186-a801597ec762 | null | null | Kekeo | [] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "vpn.zone",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:13:18.2766667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\Temp",
... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:40.3033333Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 7,452 | "mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait | 2022-11-21T02:01:44.2419747Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:44.9Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 10,556 | powershell -enc ZABpAHIA | 2022-11-21T02:01:37.8071047Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-16T09:08:30.79Z | Suspicious | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:19:04.5766667Z | Benign | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:18:37.01Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,044 | ipconfig | 2022-11-11T08:17:06.3382251Z | 4,704 | 2022-11-11T08:16:44.2952776Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638043450911419285_2079932152 | e2aacca3-bd0e-4192-9c49-f32c9ab8d30c | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:11:31.1419497Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:10:00.653487Z | 2022-11-18T05:14:14.5635165Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | 47 | PartiallyInvestigated | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:11:31.19Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T17:33:38.1366667Z | Suspicious | None | darol | prod.env | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T14:33:33.89Z | Suspicious | None | darol | malicious.io | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:18:14.6166667Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 5,344 | "mimikatz.exe" privilege::debug "lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export" exit | 2022-11-11T08:17:36.0206318Z | 4,704 | 2022-11-11T08:16:44.2952776Z | powershell.exe | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:27:36.8066667Z | Benign | None | jeff | null | S-1-5-21-2300221942-1987151257-321556088-1104 | null | null | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | 10,944 | "mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait | 2022-11-21T02:13:46.7172682Z | 11,068 | 2022-11-21T02:01:28.4753286Z | null | null | null | null | |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T21:20:35.1766667Z | Suspicious | None | darol | test.domain | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045938683943421_1830318078 | da638045938683943421_1830318078 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:17:48.3944641Z | 2022-11-21T02:19:23.2233333Z | null | 2022-11-21T02:01:39.5403186Z | 2022-11-21T02:05:26.7380973Z | Command line used for possible overpass-the-hash | A suspicious command line might have been used to perform an overpass-the-hash attack. This attack typically involves obtaining a password hash from memory and then using the ticket to authenticate. | LateralMovement | New | Medium | null | UnsupportedAlertType | null | null | MTP | 79ae2f5c-7394-4224-bae2-18fa2c975eec | null | null | null | [
"T1550.002",
"T1550.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.44Z",
"fileName": "mimikatz.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-08T10:33:23.95Z | Suspicious | None | darol | staging.net | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930214658044_-423075346 | 731f8403-267f-49a4-b9f2-bfbb454256ea | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:41.4658386Z | 2022-11-26T01:35:43.09Z | 2022-11-21T03:45:17.4759763Z | 2022-11-21T02:01:28.8879277Z | 2022-11-21T02:30:59.1966323Z | Suspicious RDP session | A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives. | SuspiciousActivity | Resolved | High | 50 | SuccessfullyRemediated | TruePositive | SecurityTesting | WindowsDefenderAtp | e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:41.86Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T14:56:38.95Z | Suspicious | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:05:47.19Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 11,616 | ipconfig | 2022-11-21T02:01:44.3957302Z | 7,452 | 2022-11-21T02:01:44.2419747Z | null | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638095379380678312_-698725880 | bd0a09a1-80c5-4179-b6c2-b8e48814680d | 984 | MicrosoftDefenderForEndpoint | 2023-01-17T07:38:58.0678468Z | 2023-01-17T07:44:35.38Z | null | 2023-01-17T07:26:36.7324019Z | 2023-01-17T07:26:36.7324019Z | 'Encryptest' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | New | Medium | 64 | PartiallyRemediated | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | null | null | Encryptest | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2023-01-17T07:15:11.3017269Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5",
"onboardingStatus": "Onboarded",
"osBuild... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2023-01-17T07:38:58.1666667Z",
"fileName": "ransomware_testfile_unsigned.exe",
"fil... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:28:43.58Z | Suspicious | None | ronhd | malicious.io | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:05:51.15Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 11,068 | whoami /all | 2022-11-21T02:01:28.4753286Z | 4,680 | 2022-11-10T07:07:26.0872385Z | explorer.exe | C:\Windows | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T19:22:30.7466667Z | Suspicious | None | guest | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963026499465_1469012925 | 8c0c6243-34ce-45ce-a756-bfdc837ffa12 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:58:22.6499651Z | 2022-12-22T09:30:09.02Z | null | 2022-12-22T08:47:29.6780551Z | 2022-12-22T09:28:41.7266951Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | New | Medium | 62 | PendingApproval | null | null | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | null | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "On... | [
{
"aadUserId": null,
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:58:22.77Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": nul... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-08T10:43:29.0366667Z | Suspicious | None | darol | evilcorp.cn | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045931511124826_-2037955442 | 72e5ed84-28b4-4e06-b94e-0fc890c34332 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:05:51.1125047Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T01:55:47.8840459Z | 2022-11-21T02:02:27.3917772Z | Suspicious System Owner/User Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1033",
"T1059.001",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:05:51.15Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043450391416859_-2026222797 | 40040bbf-008a-4259-9657-bdd5b687b6a6 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:10:39.1417086Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:04:12.7195838Z | 2022-11-18T05:14:16.2836311Z | PsExec launched a command on a remote device | PsExec was used to launch a command on a remote device. PsExec is a tool used to launch programs on remote, or local devices. An attacker might be leveraging this tool to launch malicious commands to a remote device and move laterally in the organization. | LateralMovement | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 40eca4c4-8854-418a-8024-fff7c9d7b077 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1021",
"T1021.002",
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb35... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:10:39.1833333Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638060594419234978_-2115207275 | c9194fe2-c701-4e8e-a370-073c3f95d161 | 794 | MicrosoftDefenderForEndpoint | 2022-12-08T01:24:01.9235206Z | 2022-12-08T01:37:06.9Z | null | 2022-12-08T01:12:10.9804212Z | 2022-12-08T01:12:10.9804212Z | 'Locky' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | New | Medium | 56 | PartiallyRemediated | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | null | null | Locky | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotUpdated",
"deviceDnsName": "internal.corp",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"os... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-08T01:24:02.17Z",
"fileName": "TestFile_Block_Office_applications_from_creating... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:30.4666667Z | Suspicious | None | ronhd | malicious.io | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:34:26.7466667Z | Suspicious | None | darol | evilcorp.cn | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:36:07.8466667Z | Suspicious | Active | bob | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 6,984 | PSEXESVC.exe | 2022-11-21T02:34:15.0073785Z | 680 | 2022-11-10T17:17:06.0160973Z | services.exe | C:\Windows\System32 | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:36.8866667Z | Suspicious | None | guest | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963023950039_140249729 | 77b29890-aa1c-4be4-bfa3-e89fc6c3e0e2 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:58:22.395025Z | 2022-12-22T09:30:13.3666667Z | null | 2022-12-22T08:47:29.6780551Z | 2022-12-22T09:28:41.7283803Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | New | Medium | 62 | PendingApproval | null | null | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | null | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "internal.corp",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBui... | [
{
"aadUserId": null,
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:58:22.4333333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime"... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:59:19.0966667Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,932 | type secret.txt | 2022-12-22T08:47:53.5760604Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T21:45:31.95Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963026499465_1469012925 | 8c0c6243-34ce-45ce-a756-bfdc837ffa12 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:58:22.6499651Z | 2022-12-22T08:59:28.19Z | null | 2022-12-22T08:47:29.6780551Z | 2022-12-22T08:47:52.0649455Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | New | Medium | 62 | PendingApproval | null | null | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | null | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "On... | [
{
"aadUserId": null,
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:58:22.77Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": nul... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:17:48.9433333Z | Suspicious | None | null | null | null | null | null | null | null | null | null | 0 | powershell -enc ZABpAHIA | 0001-01-01T00:00:00Z | 0 | 0001-01-01T00:00:00Z | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T04:50:04.1566667Z | Unknown | Active | Takeshi | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 20,656 | "mimikatz.exe" privilege::debug "kerberos::golden /domain:WORKGROUP /sid:S-1-5-21-7316772-2057538409-3008203053 /krbtgt: /user:Steve /ticket:C:\M365DAttack\Admin-Tickets\ticket.kirbi /ptt" exit | 2022-11-18T04:48:53.8781061Z | 14,616 | 2022-11-14T04:36:16.5242809Z | powershell.exe | \Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0 | Detected | 83b06aa80899050e5d4132992e36b5b8f14b64e9 |
da638045930212799134_-270199467 | 67e70048-1466-4a32-83ce-4b5a518a3324 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:41.2799368Z | 2022-11-26T01:35:43.09Z | 2022-11-21T03:45:17.4759763Z | 2022-11-21T02:01:44.3120047Z | 2022-11-21T02:33:53.306249Z | Mimikatz credential theft tool | The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user. | CredentialAccess | Resolved | High | 50 | SuccessfullyRemediated | TruePositive | SecurityTesting | WindowsDefenderAv | 8cac979e-6dcc-44ad-8355-480eebaff1c1 | msftadmin@msdxv2.m365dpoc.com | null | Mimikatz | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:41.3233333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAtt... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T13:27:33.96Z | Suspicious | None | darol | rnd.local | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:15:31.2733333Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,500 | type secret.txt | 2022-11-18T05:09:31.2191789Z | 4,976 | 2022-11-18T05:04:12.7150402Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638045930750456970_1638136020 | ef830471-95c7-4a4d-8c45-860205d74e11 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:04:35.0457171Z | 2022-11-21T02:36:20.0366667Z | null | 2022-11-21T02:02:06.1870037Z | 2022-11-21T02:33:42.858223Z | Suspicious remote activity | Suspicious activity initiated remotely was observed on this machine. This alert can flag attempts to initiate interactive sessions, modify files, pass WMI commands, create scheduled tasks, and other potentially malicious activities from a remote machine. | LateralMovement | New | Medium | 49 | PendingApproval | null | null | WindowsDefenderAtp | 64e1767d-3cc3-4573-8707-d2892b79c155 | null | null | null | [
"T1021",
"T1105",
"T1543.003",
"T1569.002"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "M... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:35.09Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072958615996658_-1059094230 | 0028052d-9e47-487e-bfb2-b3c8e42aa452 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:51:01.5996851Z | 2022-12-22T09:30:38.2066667Z | null | 2022-12-22T08:47:23.1319863Z | 2022-12-22T09:24:55.5977806Z | Suspicious User Account Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | null | null | null | [
"T1033",
"T1087",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDev... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:51:01.6233333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime":... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
aacaab7d29-2b1a-4b5d-ad0a-74c16d91cdbb | caab7d29-2b1a-4b5d-ad0a-74c16d91cdbb | 686 | MicrosoftDefenderForIdentity | 2022-11-11T08:18:39.0138106Z | 2022-11-12T01:40:19.35Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:17:03.823224Z | 2022-11-11T08:17:09.616093Z | Suspected overpass-the-hash attack (Kerberos) | Ron Henderson (Helpdesk Administrator) on MSDXV2-Win10V successfully authenticated against MSDXV2-DC. | DefenseEvasion | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | AzureATP | AbnormalKerberosOverpassTheHashSecurityAlert | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1550",
"T1550.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboa... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:18:39.2366667Z",
"fileName": null,
"filePath": null,
"ipAddr... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930199825735_1916178811 | 65a2531d-394f-42c9-999c-1435a314339e | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:39.9825986Z | 2022-11-21T02:34:51.19Z | null | 2022-11-21T02:01:44.3120047Z | 2022-11-21T02:32:59.4225944Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | null | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:40.3033333Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043451255713972_-1626990615 | 7f0c54af-3342-4223-8286-0559824db4a5 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:12:05.5714183Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:09:53.2585344Z | 2022-11-18T05:14:15.5156098Z | Suspicious service launched | A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device. | Execution | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | a5af9713-6eea-4d23-9bdc-9cab19f19092 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1569.002"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "M... | [] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:14:46.3933333Z | Suspicious | None | operator | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 9,940 | "mimikatz.exe" privilege::debug "kerberos::ptt C:\M365DAttack\Admin-Tickets" exit | 2022-09-30T06:13:05.4891851Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T19:22:30.7466667Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T13:26:37.6266667Z | Suspicious | None | darol | prod.env | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:03:41.86Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:26.1266667Z | Suspicious | None | jeff | staging.net | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072958363791100_-1330401106 | 69a71623-7d50-487b-a5d2-652ea50be3c0 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:50:36.3791319Z | 2022-12-22T08:54:17.8233333Z | null | 2022-12-22T08:28:11.2789495Z | 2022-12-22T08:47:23.0644132Z | Suspicious System Network Configuration Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | null | null | null | [
"T1016",
"T1049",
"T1059.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpD... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:50:36.4033333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime":... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152861365786_1066719315 | 0001b09e-7603-4f3e-af36-e744217a8a08 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:14:46.1365973Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:11:54.4489902Z | 2022-09-30T06:11:54.4489902Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:46.34Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:12:05.38Z | Suspicious | None | ronhd | prod.env | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043434789016118_-114159459 | 6daab3c1-d931-441d-88b1-b53cc148eb2a | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T04:44:38.9016327Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T04:37:59.7709697Z | 2022-11-18T04:48:29.8029363Z | Suspicious Permission Groups Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1069.001",
"T1069.002",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "tmtower-book",
"firstSeen": "2022-10-10T06:18:04.255Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Takeshi",
"domainName": "TMTOWER-BOOK"
}
],
"mdatpDeviceId":... | [
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": null,
"deviceId": null,
"domainName": "TMTOWER-BOOK",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T04:44:38.9333333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreat... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:14:52.89Z | Suspicious | None | guest | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 4,064 | "powershell.exe" | 2022-09-30T06:11:13.210308Z | null | null | null | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638001152858281819_1687592675 | e973a241-fc94-452b-8be3-00b023996ca6 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:14:45.8282007Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:11:52.2694305Z | 2022-09-30T06:13:05.4830293Z | Anomalous account lookups | An anomalous chain of attempts to look up user account information has been observed. An attacker might be gathering information about potential targets. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | ad0494b0-6cfa-4ba2-9285-706fd414acd8 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1033",
"T1069.001",
"T1069.002",
"T1087",
"T1087.001",
"T1087.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:45.93Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:39.6566667Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 10,732 | dir C:\ | 2022-11-21T02:01:38.0862456Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:50:36.4033333Z | Suspicious | None | jeff | rnd.local | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045938684726164_-666704430 | da638045938684726164_-666704430 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:17:48.4727484Z | 2022-11-21T03:29:50.9633333Z | null | 2022-11-21T02:05:26.3100593Z | 2022-11-21T02:33:42.4354734Z | Successful logon using overpass-the-hash with potentially stolen credentials | An attacker accessed a resource with credentials that might have been obtained using an overpass-the-hash attack. An overpass-the-hash attack typically involves obtaining a password hash from memory and then using the hash to obtain a Kerberos ticket. The ticket is then used to authenticate to network resources. | LateralMovement | New | Medium | null | UnsupportedAlertType | null | null | MTP | 9bd9c53d-2d3a-4af1-8c6d-a1d33ec33ede | null | null | null | [
"T1550.002",
"T1550.003"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "M... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:17:48.5166667Z",
"fileName": null,
"filePath": null,
"ipAddr... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:05:47.3Z | Suspicious | None | operator | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 9,780 | "mimikatz.exe" "lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt" exit | 2022-11-21T02:02:27.1310359Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:05:47.19Z | Suspicious | None | jeff | test.domain | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:22.8833333Z | Unknown | None | MSDXV2-Win10V$ | MSDXV2 | S-1-5-18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:03:43.73Z | Suspicious | None | jeff | test.domain | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:13:51.0033333Z | Benign | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:49:09.35Z | Malicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
aad5c5735b-8f7f-407f-acfd-2d706c7db616 | d5c5735b-8f7f-407f-acfd-2d706c7db616 | 741 | MicrosoftDefenderForIdentity | 2022-11-18T05:12:07.4139838Z | 2022-11-19T01:39:23.53Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:08:44.778634Z | 2022-11-18T05:08:49.903208Z | Suspected overpass-the-hash attack (Kerberos) | Ron Henderson (Helpdesk Administrator) on MSDXV2-Win10V successfully authenticated against MSDXV2-DC. | DefenseEvasion | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | AzureATP | AbnormalKerberosOverpassTheHashSecurityAlert | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1550",
"T1550.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild":... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:12:07.6266667Z",
"fileName": null,
"filePath": null,
"ipAddr... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.