alertId
stringclasses
278 values
providerAlertId
stringclasses
278 values
incidentId
int64
486
989
serviceSource
stringclasses
2 values
creationTime
stringdate
2022-09-30 05:04:51
2023-01-24 06:03:50
lastUpdatedTime
stringdate
2022-11-12 01:35:42
2023-01-24 06:05:47
resolvedTime
stringclasses
23 values
firstActivity
stringdate
2022-09-07 09:25:00
2023-01-24 05:31:07
lastActivity
stringdate
2022-09-30 05:00:00
2023-01-24 05:43:53
title
stringclasses
62 values
description
stringclasses
51 values
category
stringclasses
12 values
status
stringclasses
2 values
severity
stringclasses
4 values
investigationId
int64
20
64
investigationState
stringclasses
9 values
classification
stringclasses
1 value
determination
stringclasses
1 value
detectionSource
stringclasses
7 values
detectorId
stringclasses
48 values
assignedTo
stringclasses
3 values
actorName
stringclasses
1 value
threatFamilyName
stringclasses
6 values
mitreTechniques
listlengths
0
8
devices
listlengths
1
6
entities
listlengths
0
49
entityType
stringclasses
2 values
evidenceCreationTime
stringclasses
469 values
verdict
stringclasses
5 values
remediationStatus
stringclasses
2 values
accountName
stringclasses
30 values
domainName
stringclasses
17 values
userSid
stringclasses
22 values
aadUserId
stringclasses
8 values
userPrincipalName
stringclasses
14 values
sha1
stringclasses
28 values
sha256
stringclasses
27 values
fileName
stringclasses
21 values
filePath
stringclasses
13 values
processId
int64
0
20.7k
processCommandLine
stringclasses
67 values
processCreationTime
stringclasses
133 values
parentProcessId
int64
0
14.6k
parentProcessCreationTime
stringclasses
63 values
parentProcessFileName
stringclasses
14 values
parentProcessFilePath
stringclasses
11 values
detectionStatus
stringclasses
1 value
deviceId
stringclasses
9 values
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:05:47.19Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
11,616
powershell.exe C:\M365DAttack\Get-KRBTicket.ps1
2022-11-21T02:01:44.3957302Z
7,452
2022-11-21T02:01:44.2419747Z
null
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:18:14.6166667Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
5,344
"mimikatz.exe" privilege::debug "lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export" exit
2022-11-11T08:17:36.0206318Z
4,704
2022-11-11T08:16:44.2952776Z
powershell.exe
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638072957109047022_-1951943437
7a218a68-6d11-49a4-82d9-c0310ab253ed
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:30.9047201Z
2022-12-22T08:48:31.6266667Z
null
2022-12-22T08:26:21.72798Z
2022-12-22T08:47:12.1411574Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
null
null
null
[ "T1021.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "staging.net", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa008687d...
[ { "aadUserId": null, "accountName": "MSDXV8-Win10V$", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:30.9266667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCrea...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:46:07.81Z
Suspicious
None
darol
lab.net
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:50:03.6566667Z
Suspicious
Active
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
3,520
copy con test.txt
2022-11-18T04:48:53.3714952Z
14,616
2022-11-14T04:36:16.5242809Z
powershell.exe
\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-16T09:08:30.79Z
Benign
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
8,912
powershell.exe -ExecutionPolicy AllSigned -NoProfile -NonInteractive -Command "& {$OutputEncoding = [Console]::OutputEncoding =[System.Text.Encoding]::UTF8;$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '1c0f9c9177787b3146332dd0f112444d3062214f6e71e1a4bc16b1fb55818a86')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq 'f84b9499bd9dc40b993886d328828a2ed82541e54b76f9cb9e04c007eb97d8be')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '2490d8e22c01e09f99c8e32a044d6c150e75e8e75028809f73fffd9d3bf4ed92')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '5b251a22c68070bcb6be4c85e71232067581fa1483ce767e2e9fbe98a4db0229')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '13ff49e1e4a5017ae784cbe39648f9f18af975c2ce9616d52d7d7b32bec05e50')) { exit 323;}; . 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' }"
2022-11-16T09:04:33.0593386Z
7,224
2022-11-16T09:04:31.5834723Z
SenseCM.exe
C:\Program Files\Windows Defender Advanced Threat Protection
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T09:10:42.28Z
Suspicious
None
jeff
internal.corp
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:40.5733333Z
Suspicious
None
jeff
internal.corp
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043451255713972_-1626990615
7f0c54af-3342-4223-8286-0559824db4a5
741
MicrosoftDefenderForEndpoint
2022-11-18T05:12:05.5714183Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:53.2585344Z
2022-11-18T05:14:15.5156098Z
Suspicious service launched
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
Execution
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
a5af9713-6eea-4d23-9bdc-9cab19f19092
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1569.002" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "M...
[]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001152857659936_654223631
2153eef4-bddb-4c5b-bd71-d0c02e436753
486
MicrosoftDefenderForEndpoint
2022-09-30T06:14:45.7660137Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:11:51.4257849Z
2022-09-30T06:11:51.5727687Z
Multiple dual-purpose tools were dropped
Multiple known public tools, which could also be used for malicious reasons were dropped on this device. Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement.
LateralMovement
Resolved
High
20
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
e0e0ea40-b5ca-4cbf-8380-24119951f847
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021", "T1105", "T1555", "T1558.003", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb353...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:14:45.81Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072958478304122_-1638737952
fad7cdd3-8d17-4a8f-bae5-129fc37a24fc
975
MicrosoftDefenderForEndpoint
2022-12-22T08:50:47.8304325Z
2022-12-22T08:51:24.2333333Z
null
2022-12-22T08:47:28.9843705Z
2022-12-22T08:48:15.5042519Z
PsExec launched a command on a remote device
PsExec was used to launch a command on a remote device. PsExec is a tool used to launch programs on remote, or local devices. An attacker might be leveraging this tool to launch malicious commands to a remote device and move laterally in the organization.
LateralMovement
New
Medium
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
40eca4c4-8854-418a-8024-fff7c9d7b077
null
null
null
[ "T1021", "T1021.002", "T1569.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "staging.net", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa00868...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:50:47.8466667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:15:08.9233333Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,064
netstat -an
2022-09-30T06:11:13.210308Z
4,668
2022-08-23T12:17:37.8693453Z
explorer.exe
C:\Windows
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:57:24.1Z
Suspicious
None
ronhd
malicious.io
S-1-5-21-2159906967-4174806019-1002223092-1111
null
ronhd@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:39.6566667Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:19.2433333Z
Suspicious
None
jeff
prod.env
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T09:10:42.28Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
044ca0fecf2436aac3f9e7acc3c97b30588c594d
77b4c0f9929073ce132223f3169349f3e7a626c392b7dbc1a39fa89265c2c6bf
powershell_ise.exe
C:\Windows\System32\WindowsPowerShell\v1.0
5,408
type secret.txt
2022-12-22T09:07:41.4690585Z
2,980
2022-12-22T09:05:20.1978737Z
explorer.exe
C:\Windows
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
da638071952904716240_-1942787998
6aeefec7-8396-4af3-bfb6-c07abf1ec025
970
MicrosoftDefenderForEndpoint
2022-12-21T04:54:50.4716495Z
2022-12-21T04:58:53.4333333Z
null
2022-12-21T04:51:27.4606616Z
2022-12-21T04:51:27.6322575Z
Connection to a custom network indicator
An endpoint has connected to a URL or domain in your list of custom indicators.
CommandAndControl
New
Informational
null
UnsupportedAlertType
null
null
CustomerTI
08dfd06f-d2e2-4049-899f-67b406311d84
null
null
null
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV8" } ], "mda...
[ { "aadUserId": null, "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-21T04:54:51.0633333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime"...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T08:42:21.7333333Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:15:08.81Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072957493221662_648641683
a575be64-afce-415c-bfc3-dfbb3d043215
975
MicrosoftDefenderForEndpoint
2022-12-22T08:49:09.3221869Z
2022-12-22T09:30:00.09Z
null
2022-12-22T08:47:53.413688Z
2022-12-22T09:28:43.1797235Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:49:09.35Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:46.3933333Z
Suspicious
None
jeff
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T08:32:00.2766667Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:24.5566667Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,772
netstat -an
2022-12-22T08:47:23.3350389Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:29.9566667Z
Unknown
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d
8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b
explorer.exe
C:\Windows
1,896
Explorer.EXE
2022-12-22T08:26:24.0772409Z
2,796
2022-12-22T08:26:23.9030784Z
userinit.exe
C:\Windows\System32
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:52.89Z
Unknown
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,064
"powershell.exe"
2022-09-30T06:11:13.210308Z
null
null
null
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T05:26:35.34Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037516691030013_1709408990
f4acc60c-72f6-46ef-b908-d5ec4fcdbce5
686
MicrosoftDefenderForEndpoint
2022-11-11T08:21:09.1030195Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:06.1199495Z
2022-11-11T08:17:06.1199495Z
Suspicious System Network Configuration Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1016" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "test.domain", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb35...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:21:09.1466667Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:44:35.99Z
Suspicious
None
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
76866dde54ee3fa5bc8efefb9d44e6bf859973aa
afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91
net.exe
C:\Windows\System32
17,344
netstat -an
2022-11-18T04:38:44.7323003Z
14,616
2022-11-14T04:36:16.5242809Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:44.8266667Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
11,616
powershell.exe C:\M365DAttack\Get-KRBTicket.ps1
2022-11-21T02:01:44.3957302Z
null
null
null
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:22:11.45Z
Suspicious
None
null
null
null
null
null
null
null
null
null
0
type secret.txt
0001-01-01T00:00:00Z
0
0001-01-01T00:00:00Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:30.9266667Z
Malicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d
8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b
explorer.exe
C:\Windows
1,896
Explorer.EXE
2022-12-22T08:26:24.0772409Z
2,796
2022-12-22T08:26:23.9030784Z
userinit.exe
C:\Windows\System32
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:31.0933333Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:19:39.07Z
Suspicious
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
3,844
ipconfig
2022-11-11T08:17:34.3184356Z
632
2022-11-11T08:13:27.8223756Z
services.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:51:30.1466667Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d
8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b
explorer.exe
C:\Windows
1,896
ping 127.0.0.1
2022-12-22T08:26:24.0772409Z
2,796
2022-12-22T08:26:23.9030784Z
userinit.exe
C:\Windows\System32
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T10:48:32.7466667Z
Suspicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:46.3933333Z
Suspicious
None
jeff
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-12T02:15:46.9933333Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072957260831204_733079840
1f966e67-4aab-4f48-ac7e-dd189e13a417
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:46.08314Z
2022-12-22T08:48:47.25Z
null
2022-12-22T08:47:29.0129963Z
2022-12-22T08:47:29.0129963Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa00868...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:46.11Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:14:34.54Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,976
ipconfig
2022-11-18T05:04:12.7150402Z
4,680
2022-11-10T07:07:26.0872385Z
explorer.exe
C:\Windows
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638045930768340787_471517191
630cc631-5be4-4159-909f-dab5a338d73c
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:36.8341051Z
2022-11-21T02:22:48.27Z
null
2022-11-21T02:01:45.1526175Z
2022-11-21T02:20:27.7648847Z
'Kekeo' malware was detected during lateral movement
'DefenderObservation.ThreatFamily' malware was detected on this device. An attacker might be attempting to move laterally to this device from another device on the network.
LateralMovement
New
Medium
49
PendingApproval
null
null
WindowsDefenderAtp
7a6f0432-57d7-4a96-a286-0bd733ea425d
null
null
null
[ "T1021.002", "T1074.002", "T1543.003", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], ...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:36.8866667Z", "fileName": null, "filePath": null, "ipAddress": nul...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-09T13:12:39.2666667Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:46.0833333Z
Suspicious
None
jeff
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:08:38.4733333Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
3,516
copy con test.txt
2022-11-21T02:01:38.4465922Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:30.9266667Z
Malicious
None
MSDXV8-Win10V$
MSDXV8
S-1-5-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:23:28.6166667Z
Suspicious
None
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:45.07Z
Unknown
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
6,016
PSEXESVC.exe
2022-12-22T08:48:15.1693264Z
708
2022-12-20T17:24:49.8360381Z
services.exe
C:\Windows\System32
Detected
3ad3fb0567038c2ec2e59e76690c2e6c01253af9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:10:38.28Z
Suspicious
None
jeff
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:10:32.76Z
Suspicious
None
jeff
corp.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072962519493981_1698095118
19525dc0-3917-4667-866a-16f17e0d73e9
975
MicrosoftDefenderForEndpoint
2022-12-22T08:57:31.949465Z
2022-12-22T08:59:28.19Z
null
2022-12-22T08:47:50.9689566Z
2022-12-22T08:47:50.9689566Z
Suspicious service launched
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
Execution
New
Medium
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
a5af9713-6eea-4d23-9bdc-9cab19f19092
null
null
null
[ "T1569.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "staging.net", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "onboardingStatus": "Onboarded", "osBuild...
[ { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-12-22T08:57:32.0833333Z", "fileName": "PSEXESVC.exe", "filePat...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043434790542507_650999825
800cbead-8eca-48b2-9281-1140eb27aeca
741
MicrosoftDefenderForEndpoint
2022-11-18T04:44:39.0542693Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T04:37:10.8013687Z
2022-11-18T04:48:53.2431943Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "test.domain", "firstSeen": "2022-10-10T06:18:04.255Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Takeshi", "domainName": "TMTOWER-BOOK" } ], "mdatpDeviceId": ...
[ { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": null, "deviceId": null, "domainName": "TMTOWER-BOOK", "entityType": "User", "evidenceCreationTime": "2022-11-18T04:44:39.08Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTi...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:30.2433333Z
Suspicious
None
bob
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:19:57.9766667Z
Suspicious
Active
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
2,196
cmd.exe /c whoami
2022-11-11T08:07:35.110292Z
3,912
2022-11-11T08:07:35.06971Z
cmd.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:26:28.7433333Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:22:11.6666667Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:39.9733333Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:44.0733333Z
Suspicious
None
Defender
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-500
null
Defender@msdxv8.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
356
"powershell.exe"
2022-12-22T08:28:16.1808894Z
6,960
2022-12-22T08:27:20.6569514Z
explorer.exe
C:\Windows
Detected
3ad3fb0567038c2ec2e59e76690c2e6c01253af9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-19T02:34:25.7533333Z
Suspicious
None
jeff
null
S-1-5-21-2300221942-1987151257-321556088-1104
null
null
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
7,228
ping 127.0.0.1
2022-11-19T02:08:50.3807445Z
11,120
2022-11-19T02:08:50.3566833Z
null
null
null
null
da638045931470659526_1077639846
58f9697c-4be9-4140-af1f-34d50cbbe085
765
MicrosoftDefenderForEndpoint
2022-11-21T02:05:47.0659755Z
2022-11-21T02:17:47.6433333Z
null
2022-11-21T02:02:27.1005817Z
2022-11-21T02:15:09.1240511Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb353...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:05:47.11Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T10:19:27.7333333Z
5
None
hacker
null
S-1-5-21-2300221942-1987151257-321556088-502
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T07:43:55.33Z
Suspicious
None
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:15.4333333Z
Malicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:36:54.8233333Z
Suspicious
None
darol
staging.net
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515507445396_1217377639
ef22de97-109c-48f5-afcc-938c1ddfbcd5
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:10.7445617Z
2022-11-12T01:35:42.87Z
2022-11-11T09:47:40.27713Z
2022-11-11T08:17:09.0417181Z
2022-11-11T08:17:39.4979706Z
Mimikatz credential theft tool
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
CredentialAccess
Resolved
High
39
SuccessfullyRemediated
TruePositive
SecurityTesting
WindowsDefenderAv
8cac979e-6dcc-44ad-8355-480eebaff1c1
msftadmin@msdxv2.m365dpoc.com
null
Mimikatz
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "malicious.io", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:19:10.7833333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAtt...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001153088730569_1093802277
0cf8fa01-8fbb-4476-a8df-1514deded2ec
486
MicrosoftDefenderForEndpoint
2022-09-30T06:15:08.8730773Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:10:55.1361741Z
2022-09-30T06:11:51.5727687Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
Resolved
High
20
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021.001", "T1555", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "test.domain", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb35...
[ { "aadUserId": null, "accountName": "MSDXV2-Win10V$", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:15:08.9233333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCrea...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:12:05.7566667Z
Suspicious
None
root
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:34.8433333Z
Suspicious
None
guest
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
aafa1d77f7-c17d-4ca7-96f0-8f98c6b42a14
fa1d77f7-c17d-4ca7-96f0-8f98c6b42a14
765
MicrosoftDefenderForIdentity
2022-11-21T02:17:34.183737Z
2022-11-21T02:19:23.2233333Z
null
2022-11-21T02:11:18.692731Z
2022-11-21T02:13:36.4114Z
User and IP address reconnaissance (SMB)
Jeff Barker (Account Executive) on MSDXV2-Win10V enumerated SMB sessions on MSDXV2-DC, retrieving recent IP addresses of 2 accounts.
Discovery
New
Medium
null
UnsupportedAlertType
null
null
AzureATP
EnumerateSessionsSecurityAlert
null
null
null
[ "T1087", "T1049", "T1087.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboa...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:17:34.2966667Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001153595901199_-1742865935
e332b21a-1477-40dc-9267-e888f570a686
486
MicrosoftDefenderForEndpoint
2022-09-30T06:15:59.5901388Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:28.7769316Z
2022-09-30T06:13:28.7769316Z
Suspicious service launched
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
Execution
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
a5af9713-6eea-4d23-9bdc-9cab19f19092
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1569.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "defender", "domainName": "MSDXV2" }, { ...
[]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:58:22.4333333Z
Suspicious
None
root
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1111
null
ronhd@msdxv8.m365dpoc.com
fc870d086c53ded2e94300f7569aa9478186f2c7
a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1
Rubeus.exe
C:\Temp
2,536
Rubeus.exe dump /service:krbtgt /user:steve
2022-12-22T08:47:51.8048258Z
5,228
2022-12-22T08:47:51.6930217Z
cmd.exe
C:\Windows\System32
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:37:53.13Z
Suspicious
None
darol
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-21T04:54:51.0633333Z
Suspicious
None
alice
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-19T02:23:42.18Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043450333029341_-939218427
51fc30c6-87e5-49d3-97dc-446fb0a0459a
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:33.302949Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:24.7135164Z
2022-11-18T05:09:32.3483944Z
Multiple dual-purpose tools were dropped
Multiple known public tools, which could also be used for malicious reasons were dropped on this device. Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement.
LateralMovement
Resolved
High
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAtp
e0e0ea40-b5ca-4cbf-8380-24119951f847
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021", "T1105", "T1555", "T1558.003", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:10:33.3766667Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043451255718702_26524107
248fe27b-de9b-4a10-a550-6bcebfe83b44
741
MicrosoftDefenderForEndpoint
2022-11-18T05:12:05.5718949Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:32.0366644Z
2022-11-18T05:14:15.9874335Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
49
PendingApproval
TruePositive
SecurityTesting
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "M...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:12:05.72Z", "fileName": null, "filePath": null, "ipAddress": null, ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-16T09:08:30.79Z
Suspicious
None
SYSTEM
evilcorp.cn
S-1-5-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:34.4433333Z
Suspicious
None
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
aa0b733089-4ba9-428a-ac84-50ecf57ff647
0b733089-4ba9-428a-ac84-50ecf57ff647
765
MicrosoftDefenderForIdentity
2022-11-21T04:13:22.6244685Z
2022-11-21T04:15:24.8966667Z
null
2022-11-21T01:58:51.222711Z
2022-11-21T02:33:50.093383Z
Suspected identity theft (pass-the-ticket)
An actor took Steve Lewis (IT director)'s Kerberos ticket from MSDXV2-Win10B and used it on MSDXV2-Win10V to access 3 resources.
LateralMovement
New
High
null
UnsupportedAlertType
null
null
AzureATP
PassTheTicketSecurityAlert
null
null
null
[ "T1550", "T1550.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboa...
[ { "aadUserId": null, "accountName": "krbtgt", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-11-21T04:13:22.6633333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": n...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:22:11.45Z
Suspicious
None
ronhd
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:33.5Z
Malicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
10,600
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe dir \\msdxv2-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit
2022-11-18T05:09:25.8967859Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:20:35.1766667Z
Suspicious
None
darol
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:09:16.3333333Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:30:16.59Z
Benign
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:51:48.8933333Z
Suspicious
None
Takeshi
evilcorp.cn
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:45.07Z
Suspicious
None
steve
corp.local
S-1-5-21-2159906967-4174806019-1002223092-1107
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:08:38.4733333Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:49:09.35Z
Suspicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
10,852
ping 127.0.0.1
2022-12-22T08:47:53.3153269Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
da638001151822254609_781603445
20d3c0ee-af20-47bf-84df-a7808daa1048
486
MicrosoftDefenderForEndpoint
2022-09-30T06:13:02.225481Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:11:55.8115473Z
2022-09-30T06:11:55.8115473Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "staging.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb35...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:13:02.38Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930748018957_-1728305743
b2fe5df8-f486-41b4-93bf-ec47d13a1967
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:34.8019105Z
2022-11-21T02:14:10.9133333Z
null
2022-11-21T02:01:45.1526175Z
2022-11-21T02:05:52.8107598Z
Suspicious file registered as a service
A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence.
Persistence
New
Medium
49
PendingApproval
null
null
WindowsDefenderAtp
d15c9f84-aabc-46e5-a92e-7bb3ce5eceda
null
null
null
[ "T1021.002", "T1074.002", "T1543.003", "T1569.002", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "M...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:34.85Z", "fileName": null, "filePath": null, "ipAddress": null, ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:12:05.72Z
Suspicious
Active
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
8,284
type secret.txt
2022-11-18T05:10:14.6889142Z
620
2022-11-16T03:32:19.0279725Z
services.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:40.3033333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,452
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
2022-11-21T02:01:44.2419747Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638065313868828202_-405283573
c4742454-8ded-4625-af63-13bcf57fce5d
794
MicrosoftDefenderForEndpoint
2022-12-13T12:29:46.8828457Z
2022-12-13T12:35:25.2966667Z
null
2022-12-13T12:18:09.0677744Z
2022-12-13T12:18:09.0677744Z
'Locky' ransomware was prevented
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.   To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.  This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Ransomware
New
Medium
58
PendingApproval
null
null
WindowsDefenderAv
51d03c45-b142-4de4-95df-01b0c259d8f6
null
null
Locky
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-12-13T12:00:55.9665485Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "50ffd07170283e077006618b8afafeaecc185857", "onboardingStatus": "On...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "50ffd07170283e077006618b8afafeaecc185857", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-13T12:29:47.12Z", "fileName": "TestFile_Block_Office_applications_from_creating...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T19:22:30.7466667Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930199785518_-1077336413
40b5c7bb-6b12-48ac-8955-75d8315f5afa
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:39.9785874Z
2022-11-21T03:45:17.6166667Z
2022-11-21T03:45:17.4759763Z
2022-11-21T02:01:37.421151Z
2022-11-21T02:01:45.2773414Z
Multiple dual-purpose tools were dropped
Multiple known public tools, which could also be used for malicious reasons were dropped on this device. Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement.
LateralMovement
Resolved
High
50
SuccessfullyRemediated
null
null
WindowsDefenderAtp
e0e0ea40-b5ca-4cbf-8380-24119951f847
null
null
null
[ "T1003", "T1021", "T1105", "T1555", "T1558.003", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:40.5733333Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:46.97Z
Unknown
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638042092105698228_635566152
aab760b9-0558-4c1d-8aa1-f720dd7e0946
728
MicrosoftDefenderForEndpoint
2022-11-16T15:26:50.5698413Z
2022-11-19T01:35:45.0566667Z
2022-11-19T01:35:45.03Z
2022-11-16T10:05:18.4531729Z
2022-11-16T10:06:34.0514645Z
Suspicious Password Policy Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1201" ]
[ { "aadDeviceId": "c053f02e-4bf2-4146-8faa-8971c550f156", "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-srv2016.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:30:43.818Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jesse", "domainNam...
[ { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "7114973b832b32d349815a5d2811738cc10fa650", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-16T15:26:50.78Z", "fileName": "net.exe", "filePath": "C:\\W...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043452766608136_697835511
1dbd09cf-5306-4628-8e28-788f189a4fd7
741
MicrosoftDefenderForEndpoint
2022-11-18T05:14:36.6608366Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T04:59:36.2967473Z
2022-11-18T05:12:00.1092492Z
Suspicious sequence of exploration activities
A process called a set of windows commands. These commands can be used by attackers in order to identify assets of value and coordinate lateral movement after compromising a machine.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
acfdcbd1-cf72-47be-8e52-6cadc507656d
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1016", "T1018", "T1049", "T1087", "T1124", "T1135" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:14:36.7233333Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515792020663_-883827560
c06e282b-105e-41d6-a53b-ef66c941946e
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:39.2020931Z
2022-11-18T00:39:00.6933333Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:34.308141Z
2022-11-11T08:17:34.7790325Z
Suspicious remote activity
Suspicious activity initiated remotely was observed on this machine. This alert can flag attempts to initiate interactive sessions, modify files, pass WMI commands, create scheduled tasks, and other potentially malicious activities from a remote machine.
LateralMovement
Resolved
Medium
36
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
64e1767d-3cc3-4573-8707-d2892b79c155
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021", "T1105", "T1543.003", "T1569.002" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "malicious.io", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingSta...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:39.26Z", "fileName": null, "filePath": null, "ipAddress": null, ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:34.4433333Z
Suspicious
None
jeff
evilcorp.cn
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:11:45.81Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001152863299048_522463432
cada2735-4b5c-4a32-aaae-9d944fbf7869
486
MicrosoftDefenderForEndpoint
2022-09-30T06:14:46.3299234Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:05.8514932Z
2022-09-30T06:13:05.8514932Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:14:46.3933333Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null