alertId
stringclasses
278 values
providerAlertId
stringclasses
278 values
incidentId
int64
486
989
serviceSource
stringclasses
2 values
creationTime
stringdate
2022-09-30 05:04:51
2023-01-24 06:03:50
lastUpdatedTime
stringdate
2022-11-12 01:35:42
2023-01-24 06:05:47
resolvedTime
stringclasses
23 values
firstActivity
stringdate
2022-09-07 09:25:00
2023-01-24 05:31:07
lastActivity
stringdate
2022-09-30 05:00:00
2023-01-24 05:43:53
title
stringclasses
62 values
description
stringclasses
51 values
category
stringclasses
12 values
status
stringclasses
2 values
severity
stringclasses
4 values
investigationId
int64
20
64
investigationState
stringclasses
9 values
classification
stringclasses
1 value
determination
stringclasses
1 value
detectionSource
stringclasses
7 values
detectorId
stringclasses
48 values
assignedTo
stringclasses
3 values
actorName
stringclasses
1 value
threatFamilyName
stringclasses
6 values
mitreTechniques
listlengths
0
8
devices
listlengths
1
6
entities
listlengths
0
49
entityType
stringclasses
2 values
evidenceCreationTime
stringclasses
469 values
verdict
stringclasses
5 values
remediationStatus
stringclasses
2 values
accountName
stringclasses
30 values
domainName
stringclasses
17 values
userSid
stringclasses
22 values
aadUserId
stringclasses
8 values
userPrincipalName
stringclasses
14 values
sha1
stringclasses
28 values
sha256
stringclasses
27 values
fileName
stringclasses
21 values
filePath
stringclasses
13 values
processId
int64
0
20.7k
processCommandLine
stringclasses
67 values
processCreationTime
stringclasses
133 values
parentProcessId
int64
0
14.6k
parentProcessCreationTime
stringclasses
63 values
parentProcessFileName
stringclasses
14 values
parentProcessFilePath
stringclasses
11 values
detectionStatus
stringclasses
1 value
deviceId
stringclasses
9 values
da638043450382289041_499189581
7fe2225b-b6ae-4a93-a261-13e9dd6d5861
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:38.2289225Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:04:12.7195838Z
2022-11-18T05:13:20.5030117Z
Suspicious Permission Groups Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1069.001", "T1069.002", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:10:38.28Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:44.0733333Z
Suspicious
None
operator
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-500
null
Defender@msdxv8.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
356
"powershell.exe"
2022-12-22T08:28:16.1808894Z
6,960
2022-12-22T08:27:20.6569514Z
explorer.exe
C:\Windows
Detected
3ad3fb0567038c2ec2e59e76690c2e6c01253af9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:15:08.9233333Z
Malicious
None
MSDXV2-Win10V$
MSDXV2
S-1-5-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:24.5933333Z
Suspicious
None
jeff
evilcorp.cn
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:20:31.0933333Z
Suspicious
Active
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
2,352
powershell.exe C:\M365DAttack\Get-KRBTicket.ps1
2022-11-11T08:17:12.5367426Z
null
null
null
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:32.76Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
4,744
whoami /all
2022-11-18T05:09:25.177958Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:15:08.9233333Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,064
copy con test.txt
2022-09-30T06:11:13.210308Z
4,668
2022-08-23T12:17:37.8693453Z
explorer.exe
C:\Windows
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:50:04.1566667Z
Suspicious
None
Takeshi
internal.corp
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T08:32:01.7933333Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072970422431887_-1103735379
dd44b653-cbb4-4925-87a9-a403d1e588b5
975
MicrosoftDefenderForEndpoint
2022-12-22T09:10:42.2432103Z
2022-12-22T09:11:25.2633333Z
null
2022-12-22T09:05:21.3317297Z
2022-12-22T09:08:59.147227Z
Suspicious Process Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1057", "T1059.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "prod.env", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 1776...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T09:10:42.28Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:24:15.04Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,044
powershell -enc ZABpAHIA
2022-11-11T08:17:06.3382251Z
4,704
2022-11-11T08:16:44.2952776Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:47:21.7833333Z
Unknown
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043457314089213_726148940
da638043457314089213_726148940
741
MicrosoftDefenderForEndpoint
2022-11-18T05:22:11.4090201Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:26.9093402Z
2022-11-18T05:14:15.467908Z
Successful logon using overpass-the-hash with potentially stolen credentials
An attacker accessed a resource with credentials that might have been obtained using an overpass-the-hash attack. An overpass-the-hash attack typically involves obtaining a password hash from memory and then using the hash to obtain a Kerberos ticket. The ticket is then used to authenticate to network resources.
LateralMovement
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
MTP
9bd9c53d-2d3a-4af1-8c6d-a1d33ec33ede
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1550.002", "T1550.003" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "M...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:22:11.45Z", "fileName": null, "filePath": null, "ipAddress":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930235785637_-1560714689
6481deaa-0e5d-4035-a417-a8d15b86e3d0
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:43.5785844Z
2022-11-21T02:03:55.99Z
null
2022-11-21T01:57:48.8157309Z
2022-11-21T02:01:39.4913383Z
Suspicious System Network Configuration Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1016" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:43.66Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-21T04:54:50.71Z
Suspicious
None
steve
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
0a43ff3773e7fcbb9a98029957c41bc3af56ae94
d2ae715f046aec3fccbfb4fe9624fa0c5b5cf45622ca2ace26de9f56552aebe2
chrome.exe
C:\Program Files\Google\Chrome\Application
11,548
dir C:\
2022-12-21T04:51:32.1204974Z
10,208
2022-12-21T04:51:30.5564156Z
chrome.exe
C:\Program Files\Google\Chrome\Application
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
da638065313868828202_-405283573
c4742454-8ded-4625-af63-13bcf57fce5d
794
MicrosoftDefenderForEndpoint
2022-12-13T12:29:46.8828457Z
2022-12-13T12:35:25.2966667Z
null
2022-12-13T12:18:09.0677744Z
2022-12-13T12:18:09.0677744Z
'Locky' ransomware was prevented
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.   To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.  This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Ransomware
New
Medium
58
PendingApproval
null
null
WindowsDefenderAv
51d03c45-b142-4de4-95df-01b0c259d8f6
null
null
Locky
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-12-13T12:00:55.9665485Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "50ffd07170283e077006618b8afafeaecc185857", "onboardingStatus": "On...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "50ffd07170283e077006618b8afafeaecc185857", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-13T12:29:47.12Z", "fileName": "TestFile_Block_Office_applications_from_creating...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043456311109553_1236121366
2f99dcdc-e33f-4c44-9ed3-69674f977e22
741
MicrosoftDefenderForEndpoint
2022-11-18T05:20:31.1109759Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:33.3641923Z
2022-11-18T05:09:33.3641923Z
'Kekeo' malware was detected
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks. This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Malware
Resolved
Informational
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAv
d60f5b90-ecd8-4d77-8186-a801597ec762
takeshi@msdxv2.m365dpoc.com
null
Kekeo
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb353...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:20:31.1366667Z", "fileName": "Rubeus.exe", "filePath": "C:\\M365DAttac...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963850335652_-797112414
1f117fc9-2eac-4106-b532-d1fc1487bb59
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:45.0335888Z
2022-12-22T09:09:29.2566667Z
2022-12-22T09:09:29.0872242Z
2022-12-22T08:22:42.0859019Z
2022-12-22T08:48:15.2244011Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
63
Benign
null
null
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
Automation
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv8-dc.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T01:05:46.8493187Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "3ad3fb0567038c2ec2e59e76690c2e6c01253af9", "onboardingStatus": "O...
[ { "aadUserId": null, "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:45.07Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": nul...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:19.3466667Z
Unknown
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963841363227_-482895426
fef29d86-93f2-4af8-b489-d5707fb5909c
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:44.1363425Z
2022-12-22T09:25:44.3733333Z
null
2022-12-22T08:27:59.3887959Z
2022-12-22T08:48:41.1881268Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1033", "T1106" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "internal.corp", "firstSeen": "2022-12-08T01:05:46.8493187Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV8" } ], "mdatpDeviceId":...
[ { "aadUserId": null, "accountName": "Defender", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:44.16Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045944567649219_-118043040
da638045944567649219_-118043040
765
MicrosoftDefenderForEndpoint
2022-11-21T02:27:36.7650424Z
2022-11-21T02:28:04.0766667Z
null
2022-11-21T02:05:26.6960915Z
2022-11-21T02:13:47.6774932Z
Enumeration of SMB sessions on a domain controller
A process is enumerating SMB sessions on a domain controller. An attacker might be looking for accessible shares or performing other reconnaissance activities in preparation for lateral movement to the domain controller.
Discovery
New
Medium
null
UnsupportedAlertType
null
null
MTP
53244628-2544-44ce-9109-0c9c36e47b35
null
null
null
[ "T1135", "T1087.001", "T1087.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb353...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:27:36.8066667Z", "fileName": "mimikatz.exe", "filePath": "", "ipAddress": null, "parentProcessCreatio...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T09:30:33.92Z
Suspicious
None
bob
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
044ca0fecf2436aac3f9e7acc3c97b30588c594d
77b4c0f9929073ce132223f3169349f3e7a626c392b7dbc1a39fa89265c2c6bf
powershell_ise.exe
C:\Windows\System32\WindowsPowerShell\v1.0
5,408
"PowerShell_ISE.exe"
2022-12-22T09:07:41.4690585Z
2,980
2022-12-22T09:05:20.1978737Z
explorer.exe
C:\Windows
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
da638041842702463920_-1758112065
2720542b-975f-4f46-91da-54f8de1527b1
728
MicrosoftDefenderForEndpoint
2022-11-16T08:31:10.2464107Z
2022-11-19T01:35:45.0566667Z
2022-11-19T01:35:45.03Z
2022-11-16T08:30:16.9229263Z
2022-11-16T08:30:18.2064033Z
Tampering with the Microsoft Defender for Endpoint sensor
An attempt to tamper with the Microsoft Defender for Endpoint sensor was detected. This activity can indicate malicious intent to interfere with the monitoring of the device. Tampering activity might stop the sensor and prevent the device from sending telemetry to the service.
DefenseEvasion
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
6bf05a55-a30f-4799-96d9-ab560d2344f4
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1562.001" ]
[ { "aadDeviceId": "c053f02e-4bf2-4146-8faa-8971c550f156", "defenderAvStatus": "NotSupported", "deviceDnsName": "malicious.io", "firstSeen": "2022-08-08T08:30:43.818Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jesse", "domainName": "MSDXV2" } ...
[ { "aadUserId": "34a6a005-fc93-42dc-ae87-352d3e9921c4", "accountName": "jesse", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-16T08:31:10.4566667Z", "fileName": null, "filePath": null, "ipAddr...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T15:03:59.3666667Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:15:59.72Z
Suspicious
Active
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
7,308
copy con test.txt
2022-09-30T06:13:28.5321636Z
644
2022-09-14T17:17:59.9661798Z
services.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T09:05:50.6533333Z
Suspicious
None
jeff
corp.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:17:48.44Z
Suspicious
None
bob
null
S-1-5-21-2300221942-1987151257-321556088-1104
null
null
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
6,412
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe dir \\msdxv2-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit
2022-11-21T02:05:25.5028748Z
11,068
2022-11-21T02:01:28.4753286Z
null
null
null
null
da638072957044260847_1680122725
7db6d4ed-b9d0-469b-8d42-5a207d28b45c
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:24.4261035Z
2022-12-22T08:50:38.6933333Z
null
2022-12-22T08:47:23.1319863Z
2022-12-22T08:47:23.7158614Z
Anomalous account lookups
An anomalous chain of attempts to look up user account information has been observed. An attacker might be gathering information about potential targets.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
ad0494b0-6cfa-4ba2-9285-706fd414acd8
null
null
null
[ "T1033", "T1069.001", "T1069.002", "T1087", "T1087.001", "T1087.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:24.5933333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:22:11.6666667Z
Suspicious
None
ronhd
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:20:49.52Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043451806873428_1564497180
aa5292eb-a8e6-44fa-873c-ace9c135380d
741
MicrosoftDefenderForEndpoint
2022-11-18T05:13:00.6873733Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:54.5551695Z
2022-11-18T05:13:55.0820617Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "prod.env", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:13:00.7233333Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:30.4666667Z
Suspicious
None
ronhd
internal.corp
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638065313887400647_-445185874
0e865fec-7f5d-4cfb-aab4-a2d15412095f
794
MicrosoftDefenderForEndpoint
2022-12-13T12:29:48.7400829Z
2022-12-13T12:35:25.2966667Z
null
2022-12-13T12:18:08.9271426Z
2022-12-13T12:18:08.9271426Z
'Donoff' malware was prevented
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks. This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Malware
New
Informational
58
PendingApproval
null
null
WindowsDefenderAv
d60f5b90-ecd8-4d77-8186-a801597ec762
null
null
Donoff
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-12-13T12:00:55.9665485Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "50ffd07170283e077006618b8afafeaecc185857", "onboardingStatus": "On...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "50ffd07170283e077006618b8afafeaecc185857", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-13T12:29:48.7766667Z", "fileName": "TestFile_OfficeChildProcess_D4F940AB-401B-4...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638065141690799395_574213459
cdeae75b-8c21-4259-b37e-f8659c85a5f6
794
MicrosoftDefenderForEndpoint
2022-12-13T07:42:49.0799617Z
2022-12-13T07:51:49.87Z
2022-12-13T07:51:49.6590458Z
2022-12-13T07:29:32.109068Z
2022-12-13T07:29:32.109068Z
'Encryptest' ransomware was prevented
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.   To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.  This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Ransomware
Resolved
Medium
57
SuccessfullyRemediated
null
null
WindowsDefenderAv
51d03c45-b142-4de4-95df-01b0c259d8f6
Automation
null
Encryptest
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "master-win10b.master.m365dpoc.com", "firstSeen": "2022-12-13T07:14:16.856Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba", "onboardingStatus": "Onboar...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-13T07:42:49.13Z", "fileName": "ransomware_testfile_unsigned.exe", "filePath...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043434790542507_650999825
800cbead-8eca-48b2-9281-1140eb27aeca
741
MicrosoftDefenderForEndpoint
2022-11-18T04:44:39.0542693Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T04:37:10.8013687Z
2022-11-18T04:48:53.2431943Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "prod.env", "firstSeen": "2022-10-10T06:18:04.255Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Takeshi", "domainName": "TMTOWER-BOOK" } ], "mdatpDeviceId": "83...
[ { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": null, "deviceId": null, "domainName": "TMTOWER-BOOK", "entityType": "User", "evidenceCreationTime": "2022-11-18T04:44:39.08Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTi...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:13:04.69Z
Suspicious
None
jeff
prod.env
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930660064910_-1043423044
c82ef2f7-1b27-40a6-a43b-ce7a975623c2
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:26.0065203Z
2022-11-21T02:34:51.2166667Z
null
2022-11-21T02:02:28.8560243Z
2022-11-21T02:33:53.306249Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb35...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:26.0433333Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037516238605644_1022196159
dfeb343f-5583-4d12-806b-8e9de9bec3b4
686
MicrosoftDefenderForEndpoint
2022-11-11T08:20:23.8605872Z
2022-11-12T01:35:42.87Z
2022-11-11T09:47:40.27713Z
2022-11-11T08:15:23.3115781Z
2022-11-11T08:17:05.7568492Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
Resolved
High
39
SuccessfullyRemediated
TruePositive
SecurityTesting
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021.001", "T1555", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "internal.corp", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:20:23.9066667Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T09:30:44.15Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045935113744267_1561680225
02e6af6b-d1cc-4482-939d-e15e8a5f6e16
765
MicrosoftDefenderForEndpoint
2022-11-21T02:11:51.3744432Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:07:15.8948675Z
2022-11-21T02:34:15.7485618Z
Suspicious account creation
A new user account was created. A new user account can be created to establish a secondary of backup access to the device or services within the organization. An attacker might be attempting to maintain access to the device or organization.
Persistence
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
b0c31f72-1d80-458a-8ceb-5bc7bbcbd30a
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1136", "T1136.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV2" } ], "mda...
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:11:51.46Z", "fileName": null, "filePath": null, "ipAddress":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:52.3466667Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,728
netstat -an
2022-11-18T05:09:59.3725807Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:40.3033333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,452
whoami /all
2022-11-21T02:01:44.2419747Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638043457314089213_726148940
da638043457314089213_726148940
741
MicrosoftDefenderForEndpoint
2022-11-18T05:22:11.4090201Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:26.9093402Z
2022-11-18T05:14:15.467908Z
Successful logon using overpass-the-hash with potentially stolen credentials
An attacker accessed a resource with credentials that might have been obtained using an overpass-the-hash attack. An overpass-the-hash attack typically involves obtaining a password hash from memory and then using the hash to obtain a Kerberos ticket. The ticket is then used to authenticate to network resources.
LateralMovement
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
MTP
9bd9c53d-2d3a-4af1-8c6d-a1d33ec33ede
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1550.002", "T1550.003" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "M...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:22:11.45Z", "fileName": null, "filePath": null, "ipAddress":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:33:31.3666667Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:38.28Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
4,744
ping 127.0.0.1
2022-11-18T05:09:25.177958Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638045930950835514_396878374
7a8be391-9140-4529-b727-24c7b062077e
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:55.0835712Z
2022-11-21T02:04:55.6166667Z
null
2022-11-21T02:02:30.8693215Z
2022-11-21T02:02:30.8693215Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb353...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:55.1233333Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:20:49.52Z
Unknown
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T09:07:38.41Z
Benign
None
null
null
null
null
null
null
null
null
null
0
0001-01-01T00:00:00Z
0
0001-01-01T00:00:00Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:11:51.46Z
Suspicious
None
steve
vpn.zone
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:47.4866667Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,036
netstat -an
2022-09-30T06:13:06.97219Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
aa4391e95c-8aba-4a72-bd40-71403fbc2d84
4391e95c-8aba-4a72-bd40-71403fbc2d84
486
MicrosoftDefenderForIdentity
2022-09-30T05:04:51.8089421Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-29T00:00:28.57093Z
2022-09-30T05:00:00.1139595Z
Account enumeration reconnaissance
An actor on workstation performed suspicious account enumeration, exposing 2 existing account names, while trying to access 4 resources.
Discovery
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
AzureATP
AccountEnumerationSecurityAlert
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1087", "T1087.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "staging.net", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuil...
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T05:04:51.8433333Z", "fileName": null, "filePath": null, "ipAddr...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:21:09.1466667Z
Suspicious
None
jeff
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2023-01-24T05:33:37.4166667Z
Suspicious
Active
NETWORK SERVICE
NT AUTHORITY
S-1-5-20
null
null
3ea7cc066317ac45f963c2227c4c7c50aa16eb7c
2198a7b58bccb758036b969ddae6cc2ece07565e2659a7c541a313a0492231a3
WmiPrvSE.exe
C:\Windows\System32\wbem
7,824
curl http://malicious
2023-01-24T05:30:50.8649791Z
896
2023-01-24T04:44:17.1940386Z
svchost.exe
C:\Windows\System32
Detected
302293d9f276eae65553e5042156bce93cbc7148
da638043451256859899_1067221136
fc6c102f-d0dc-40ea-bcf9-25ceadcf24d0
741
MicrosoftDefenderForEndpoint
2022-11-18T05:12:05.6860157Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:32.1537154Z
2022-11-18T05:13:49.1918726Z
Suspicious file registered as a service
A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence.
Persistence
Resolved
Medium
49
PendingApproval
TruePositive
SecurityTesting
WindowsDefenderAtp
d15c9f84-aabc-46e5-a92e-7bb3ce5eceda
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1074.002", "T1543.003", "T1569.002", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "M...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:12:05.7566667Z", "fileName": null, "filePath": null, "ipAddress": nul...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043451809630419_-665093391
beaf820c-2f6c-4b34-8b75-09f18ebaf689
741
MicrosoftDefenderForEndpoint
2022-11-18T05:13:00.9630666Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:11:26.6986272Z
2022-11-18T05:16:26.1851657Z
Password hashes dumped from LSASS memory
LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users.
CredentialAccess
Resolved
Medium
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAtp
2ed33edd-2c33-49fd-877b-ab73fba14d59
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1003.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:13:01.0066667Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:39.97Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072957269391914_460423443
8e2d122c-81ac-4e3d-b833-ed3b945bae52
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:46.9392096Z
2022-12-22T08:48:47.5266667Z
null
2022-12-22T08:47:56.5126458Z
2022-12-22T08:47:56.5126458Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "prod.env", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa008687dd...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:46.97Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072958361208636_-774564177
dacbe670-c799-4085-9e4b-0c16dbfa3330
975
MicrosoftDefenderForEndpoint
2022-12-22T08:50:36.1208906Z
2022-12-22T08:50:42.2233333Z
null
2022-12-22T08:47:23.1371052Z
2022-12-22T08:47:28.9843705Z
Suspicious Permission Groups Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1069.001", "T1069.002", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "test.domain", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa00868...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:50:36.15Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T14:57:24.9866667Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T08:42:21.7333333Z
Suspicious
None
darol
lab.net
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
daf4215009-1ce2-44c4-a5f1-1c9d5ca35543_1
f4215009-1ce2-44c4-a5f1-1c9d5ca35543_1
989
MicrosoftDefenderForEndpoint
2023-01-24T05:40:41.348382Z
2023-01-24T06:04:07.69Z
null
2023-01-24T05:30:50.3735805Z
2023-01-24T05:36:25.2908178Z
Multiple ports scanned by remote device
A device is initiating connections on multiple ports to this device. An attacker might be attempting to discover open ports to access your network.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
92c95358-84b2-42b5-8b37-897993fe4ece
null
null
null
[ "T1046" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "diytestmachine", "firstSeen": "2023-01-24T04:45:42.979Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "administrator1", "domainName": "DIYTESTMACHINE" } ], "mdatpDevi...
[ { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2023-01-24T05:40:41.52Z", "fileName": null, "filePath": null, "ipAddress": "192.168.119.199", "parentProcessCreationTime":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:46.0833333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,064
powershell -enc ZABpAHIA
2022-09-30T06:11:13.210308Z
4,668
2022-08-23T12:17:37.8693453Z
explorer.exe
C:\Windows
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638043450523110962_-716607076
65783189-4a7d-431f-95f6-1e15eaa0b43f
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:52.3111173Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:10:02.6736048Z
2022-11-18T05:14:14.8801055Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:10:52.3466667Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:14:38.81Z
Suspicious
None
system
null
S-1-5-18
null
null
3791cf139c5f9e5c97e9c091f73e441b6a9bbd30
e2f1857de3560a5237ca7ea661fc3688715bbbf6baa483511d49baac4ce1acf9
System
c:\windows\system32\ntoskrnl.exe
4
whoami /all
2022-11-10T07:05:52.3386022Z
0
0001-01-01T00:00:00Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:51:54.57Z
Suspicious
None
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:11:51.46Z
Suspicious
Active
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
ded8fd7f36417f66eb6ada10e0c0d7c0022986e9
bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527
cmd.exe
C:\Windows\System32
3,020
"cmd" /c "net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\"" && net.exe start ntds"
2022-11-21T02:07:15.6313121Z
7,232
2022-11-21T02:07:15.1389846Z
PSEXESVC.exe
C:\Windows
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
aa0b733089-4ba9-428a-ac84-50ecf57ff647
0b733089-4ba9-428a-ac84-50ecf57ff647
765
MicrosoftDefenderForIdentity
2022-11-21T04:13:22.6244685Z
2022-11-21T04:15:24.8966667Z
null
2022-11-21T01:58:51.222711Z
2022-11-21T02:33:50.093383Z
Suspected identity theft (pass-the-ticket)
An actor took Steve Lewis (IT director)'s Kerberos ticket from MSDXV2-Win10B and used it on MSDXV2-Win10V to access 3 resources.
LateralMovement
New
High
null
UnsupportedAlertType
null
null
AzureATP
PassTheTicketSecurityAlert
null
null
null
[ "T1550", "T1550.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuil...
[ { "aadUserId": null, "accountName": "krbtgt", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-11-21T04:13:22.6633333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": n...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:16:01.4666667Z
Suspicious
Active
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
fc870d086c53ded2e94300f7569aa9478186f2c7
a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1
Rubeus.exe
C:\Temp
2,820
Rubeus.exe dump /service:krbtgt /user:steve
2022-09-30T06:13:04.1259063Z
2,224
2022-09-30T06:13:04.078106Z
cmd.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:29:49.5433333Z
Benign
None
null
null
null
null
null
null
null
null
null
0
0001-01-01T00:00:00Z
0
0001-01-01T00:00:00Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:15:13.68Z
Suspicious
None
darol
lab.net
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:24:37.89Z
Benign
None
ronhd
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:52.3466667Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,728
"mimikatz.exe" privilege::debug "kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt: /user:Steve /ticket:C:\M365DAttack\Admin-Tickets\ticket.kirbi /ptt" exit
2022-11-18T05:09:59.3725807Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638072968583158181_286494073
da638072968583158181_286494073
975
MicrosoftDefenderForEndpoint
2022-12-22T09:07:38.3159548Z
2022-12-22T09:09:50.03Z
null
2022-12-22T08:38:05.6474582Z
2022-12-22T08:38:18.0452419Z
Possible lateral movement
Lateral movement on another device was observed in close time proximity to a suspicious network event on this device. This could mean that an attacker is attempting to move laterally across devices to gather data or elevate privileges. This alert was triggered based on a Microsoft Defender for Endpoint alert.
LateralMovement
New
Medium
null
UnsupportedAlertType
null
null
MTP
ab3e5834-3d38-42c5-aaa6-c1cfc6c02882
null
null
null
[ "T1570", "T1021", "T1021.002", "T1021.003", "T1021.004", "T1021.006" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "staging.net", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV8" } ], "mdatpDeviceId": "4f111b3b...
[ { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:07:38.41Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": "0001-0...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638065313868828202_-405283573
c4742454-8ded-4625-af63-13bcf57fce5d
794
MicrosoftDefenderForEndpoint
2022-12-13T12:29:46.8828457Z
2022-12-13T12:35:25.2966667Z
null
2022-12-13T12:18:09.0677744Z
2022-12-13T12:18:09.0677744Z
'Locky' ransomware was prevented
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.   To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.  This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Ransomware
New
Medium
58
PendingApproval
null
null
WindowsDefenderAv
51d03c45-b142-4de4-95df-01b0c259d8f6
null
null
Locky
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "malicious.io", "firstSeen": "2022-12-13T12:00:55.9665485Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "50ffd07170283e077006618b8afafeaecc185857", "onboardingStatus": "Onboarded", "osBuil...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "50ffd07170283e077006618b8afafeaecc185857", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-13T12:29:47.12Z", "fileName": "TestFile_Block_Office_applications_from_creating...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-08T10:39:24.8066667Z
Suspicious
None
darol
prod.env
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:26.1266667Z
Suspicious
None
jeff
internal.corp
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:19:35.2Z
Malicious
None
krbtgt
null
S-1-5-21-2300221942-1987151257-321556088-502
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:30.4666667Z
Suspicious
None
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:15.74Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:47:32.52Z
Malicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:51:27.9433333Z
Suspicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-08T10:33:23.95Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:43:38.7033333Z
Suspicious
None
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045938684726164_-666704430
da638045938684726164_-666704430
765
MicrosoftDefenderForEndpoint
2022-11-21T02:17:48.4727484Z
2022-11-21T03:29:50.9633333Z
null
2022-11-21T02:05:26.3100593Z
2022-11-21T02:33:42.4354734Z
Successful logon using overpass-the-hash with potentially stolen credentials
An attacker accessed a resource with credentials that might have been obtained using an overpass-the-hash attack. An overpass-the-hash attack typically involves obtaining a password hash from memory and then using the hash to obtain a Kerberos ticket. The ticket is then used to authenticate to network resources.
LateralMovement
New
Medium
null
UnsupportedAlertType
null
null
MTP
9bd9c53d-2d3a-4af1-8c6d-a1d33ec33ede
null
null
null
[ "T1550.002", "T1550.003" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "M...
[ { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:48.5166667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": "0...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:24.5566667Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,772
netstat -an
2022-12-22T08:47:23.3350389Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
da638001156016297093_744680965
b797799f-a9e5-496a-aac4-7b7f1f81b61c
486
MicrosoftDefenderForEndpoint
2022-09-30T06:20:01.6297246Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:16:39.7387937Z
2022-09-30T06:16:39.7387937Z
Password hashes dumped from LSASS memory
LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users.
CredentialAccess
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
2ed33edd-2c33-49fd-877b-ab73fba14d59
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1003.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "internal.corp", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:20:01.6733333Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001153088730569_1093802277
0cf8fa01-8fbb-4476-a8df-1514deded2ec
486
MicrosoftDefenderForEndpoint
2022-09-30T06:15:08.8730773Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:10:55.1361741Z
2022-09-30T06:11:51.5727687Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
Resolved
High
20
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021.001", "T1555", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": "MSDXV2-Win10V$", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:15:08.9233333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCrea...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T07:42:29.0166667Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:15.74Z
Unknown
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:45:22.84Z
Suspicious
None
darol
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045936784120432_2060248006
da638045936784120432_2060248006
765
MicrosoftDefenderForEndpoint
2022-11-21T02:14:38.4122447Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:01:39.1809617Z
2022-11-21T02:01:39.1809617Z
Possible lateral movement involving a suspicious file transfer over SMB
A device was detected transfering a suspicious file over SMB to another endpoint. An ongoing attack might be attempting to move laterally by copying implants or other payloads to other endpoints.
LateralMovement
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
MTP
433625e1-8397-4a2e-a97d-edd4698267b2
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1570", "T1021.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-21T02:14:38.46Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.5", "parentProcessCreationTime": null, ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-21T04:54:50.71Z
Suspicious
None
steve
malicious.io
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:10:42.37Z
Unknown
None
MSDXV2-Win10V$
MSDXV2
S-1-5-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:44.16Z
Suspicious
None
alice
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-500
null
Defender@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:43.66Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
9a3be34e8316ebb945a4d5818a4066c91fe98c95
54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6
nslookup.exe
C:\Windows\System32
1,716
ipconfig
2022-11-21T02:01:37.5530608Z
728
2022-11-21T02:01:37.5336889Z
cmd.exe
C:\Windows\System32
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T05:36:50.2133333Z
Unknown
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072970422431887_-1103735379
dd44b653-cbb4-4925-87a9-a403d1e588b5
975
MicrosoftDefenderForEndpoint
2022-12-22T09:10:42.2432103Z
2022-12-22T09:11:25.2633333Z
null
2022-12-22T09:05:21.3317297Z
2022-12-22T09:08:59.147227Z
Suspicious Process Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1057", "T1059.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboar...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T09:10:42.28Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T15:55:54.4233333Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930195076938_-1427452130
1825f748-eaa9-475d-af74-88e39dcdf26d
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:39.5077156Z
2022-11-21T02:34:51.0566667Z
null
2022-11-21T02:01:38.5208087Z
2022-11-21T02:32:54.3897964Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:39.9733333Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-16T09:09:13.3533333Z
Suspicious
None
root
NT AUTHORITY
S-1-5-18
null
null
044a0cf1f6bc478a7172bf207eef1e201a18ba02
ba4038fd20e474c047be8aad5bfacdb1bfc1ddbe12f803f473b7918d8d819436
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
3,764
powershell.exe -ExecutionPolicy AllSigned -NoProfile -NonInteractive -Command "& {$OutputEncoding = [Console]::OutputEncoding =[System.Text.Encoding]::UTF8;$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '1c0f9c9177787b3146332dd0f112444d3062214f6e71e1a4bc16b1fb55818a86')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq 'f84b9499bd9dc40b993886d328828a2ed82541e54b76f9cb9e04c007eb97d8be')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '2490d8e22c01e09f99c8e32a044d6c150e75e8e75028809f73fffd9d3bf4ed92')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '5b251a22c68070bcb6be4c85e71232067581fa1483ce767e2e9fbe98a4db0229')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '13ff49e1e4a5017ae784cbe39648f9f18af975c2ce9616d52d7d7b32bec05e50')) { exit 323;}; . 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' }"
2022-11-16T09:06:26.1426374Z
1,748
2022-11-16T09:06:24.6563216Z
SenseCM.exe
C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\10.8210.22621.1011
Detected
7114973b832b32d349815a5d2811738cc10fa650