alertId stringclasses 278 values | providerAlertId stringclasses 278 values | incidentId int64 486 989 ⌀ | serviceSource stringclasses 2 values | creationTime stringdate 2022-09-30 05:04:51 2023-01-24 06:03:50 ⌀ | lastUpdatedTime stringdate 2022-11-12 01:35:42 2023-01-24 06:05:47 ⌀ | resolvedTime stringclasses 23 values | firstActivity stringdate 2022-09-07 09:25:00 2023-01-24 05:31:07 ⌀ | lastActivity stringdate 2022-09-30 05:00:00 2023-01-24 05:43:53 ⌀ | title stringclasses 62 values | description stringclasses 51 values | category stringclasses 12 values | status stringclasses 2 values | severity stringclasses 4 values | investigationId int64 20 64 ⌀ | investigationState stringclasses 9 values | classification stringclasses 1 value | determination stringclasses 1 value | detectionSource stringclasses 7 values | detectorId stringclasses 48 values | assignedTo stringclasses 3 values | actorName stringclasses 1 value | threatFamilyName stringclasses 6 values | mitreTechniques listlengths 0 8 ⌀ | devices listlengths 1 6 ⌀ | entities listlengths 0 49 ⌀ | entityType stringclasses 2 values | evidenceCreationTime stringclasses 469 values | verdict stringclasses 5 values | remediationStatus stringclasses 2 values | accountName stringclasses 30 values | domainName stringclasses 17 values | userSid stringclasses 22 values | aadUserId stringclasses 8 values | userPrincipalName stringclasses 14 values | sha1 stringclasses 28 values | sha256 stringclasses 27 values | fileName stringclasses 21 values | filePath stringclasses 13 values | processId int64 0 20.7k ⌀ | processCommandLine stringclasses 67 values | processCreationTime stringclasses 133 values | parentProcessId int64 0 14.6k ⌀ | parentProcessCreationTime stringclasses 63 values | parentProcessFileName stringclasses 14 values | parentProcessFilePath stringclasses 11 values | detectionStatus stringclasses 1 value | deviceId stringclasses 9 values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T15:55:54.4233333Z | Suspicious | None | darol | prod.env | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:43.66Z | Suspicious | Active | svc_acct | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 9a3be34e8316ebb945a4d5818a4066c91fe98c95 | 54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6 | nslookup.exe | C:\Windows\System32 | 1,716 | nslookup msdxv2-dc.msdxv2.m365dpoc.com | 2022-11-21T02:01:37.5530608Z | 728 | 2022-11-21T02:01:37.5336889Z | cmd.exe | C:\Windows\System32 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638037516238605644_1022196159 | dfeb343f-5583-4d12-806b-8e9de9bec3b4 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:20:23.8605872Z | 2022-11-12T01:35:42.87Z | 2022-11-11T09:47:40.27713Z | 2022-11-11T08:15:23.3115781Z | 2022-11-11T08:17:05.7568492Z | Suspicious RDP session | A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives. | SuspiciousActivity | Resolved | High | 39 | SuccessfullyRemediated | TruePositive | SecurityTesting | WindowsDefenderAtp | e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "malicious.io",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:23.9066667Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:39:46.1966667Z | Suspicious | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 268 | ping 127.0.0.1 | 2022-11-11T08:17:57.8297749Z | 680 | 2022-11-10T17:17:06.0160973Z | services.exe | C:\Windows\System32 | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:38.9833333Z | Suspicious | Active | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 3,844 | ping 127.0.0.1 | 2022-11-11T08:17:34.3184356Z | 632 | 2022-11-11T08:13:27.8223756Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
da638001158778670438_1692884775 | da638001158778670438_1692884775 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:24:37.867138Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:11:54.2859211Z | 2022-09-30T06:13:03.8931241Z | Successful logon using overpass-the-hash with potentially stolen credentials | An attacker accessed a resource with credentials that might have been obtained using an overpass-the-hash attack. An overpass-the-hash attack typically involves obtaining a password hash from memory and then using the hash to obtain a Kerberos ticket. The ticket is then used to authenticate to network resources. | LateralMovement | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | MTP | 9bd9c53d-2d3a-4af1-8c6d-a1d33ec33ede | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1550.002",
"T1550.003"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "M... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:24:37.89Z",
"fileName": null,
"filePath": null,
"ipAddress":... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045931471513680_-728742532 | 1fe2d53f-2f71-4007-b545-94c136e5eeda | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:05:47.1514001Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:02:06.7577322Z | 2022-11-21T02:33:22.1944641Z | Possible use of the Rubeus kerberoasting tool | Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication.
During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets. | SuspiciousActivity | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 6606ef29-d293-4f24-a7c5-334dcb40b412 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:05:47.19Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T09:30:37.3433333Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | ef95ff34f5eb7a36e4dba9d7957811caf738ef53 | 812ccfa2d234ef9989e1730976dd8217d0f3107fbd92244454a5fb735051b8db | schtasks.exe | C:\Windows\System32 | 6,868 | ipconfig | 2022-12-22T09:26:42.0786601Z | 5,408 | 2022-12-22T09:07:41.4690585Z | powershell_ise.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:22:11.6666667Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:13:50.9266667Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,464 | powershell -enc ZABpAHIA | 2022-09-30T06:13:06.6052353Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T15:55:54.4233333Z | Suspicious | None | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:46.24Z | Malicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:20:22.8833333Z | Suspicious | None | bob | MSDXV2 | S-1-5-18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:48:24.5566667Z | Suspicious | None | svc_acct | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:13:00.6633333Z | Benign | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 9,332 | "mimikatz.exe" "lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt" exit | 2022-11-18T05:09:59.0460935Z | 4,976 | 2022-11-18T05:04:12.7150402Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:39:46.1966667Z | Suspicious | None | steve | evilcorp.cn | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930748018957_-1728305743 | b2fe5df8-f486-41b4-93bf-ec47d13a1967 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:04:34.8019105Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:01:45.1526175Z | 2022-11-21T02:05:52.8107598Z | Suspicious file registered as a service | A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence. | Persistence | Resolved | Medium | 49 | TerminatedBySystem | TruePositive | SecurityTesting | WindowsDefenderAtp | d15c9f84-aabc-46e5-a92e-7bb3ce5eceda | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1021.002",
"T1074.002",
"T1543.003",
"T1569.002",
"T1570"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "test.domain",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:34.85Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:40.5733333Z | Unknown | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 11,616 | powershell.exe C:\M365DAttack\Get-KRBTicket.ps1 | 2022-11-21T02:01:44.3957302Z | 7,452 | 2022-11-21T02:01:44.2419747Z | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T04:50:03.6566667Z | Suspicious | Active | Takeshi | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 3,520 | netstat -an | 2022-11-18T04:48:53.3714952Z | 14,616 | 2022-11-14T04:36:16.5242809Z | powershell.exe | \Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0 | Detected | 83b06aa80899050e5d4132992e36b5b8f14b64e9 |
da638043451806149103_-1025772494 | a68087cb-35ec-44ae-a5f8-540ac69855d5 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:13:00.6149339Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:09:59.1103424Z | 2022-11-18T05:09:59.1166451Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:13:00.6633333Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930236864359_-743961971 | 479e0b88-c4a8-4b82-8d31-90abda7894c1 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:43.686456Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T01:55:47.8840459Z | 2022-11-21T02:32:54.3762442Z | Suspicious sequence of exploration activities | A process called a set of windows commands. These commands can be used by attackers in order to identify assets of value and coordinate lateral movement after compromising a machine. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | acfdcbd1-cf72-47be-8e52-6cadc507656d | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1016",
"T1018",
"T1033",
"T1049",
"T1087",
"T1087.001",
"T1135"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:43.73Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930704256313_1763457179 | 5ab5c14a-dab2-4df3-813c-d63f2d243b21 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:04:30.4256515Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:02:27.8997725Z | 2022-11-21T02:33:42.858757Z | Possible use of the Rubeus kerberoasting tool | Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication.
During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets. | SuspiciousActivity | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 6606ef29-d293-4f24-a7c5-334dcb40b412 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1558.003"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "M... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:30.4666667Z",
"fileName": null,
"filePath": null,
"ipAddr... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:50:49.9533333Z | Suspicious | None | user1 | MSDXV8 | S-1-5-18 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:05:47.19Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 11,616 | powershell.exe C:\M365DAttack\Get-KRBTicket.ps1 | 2022-11-21T02:01:44.3957302Z | 7,452 | 2022-11-21T02:01:44.2419747Z | null | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638065313868828202_-405283573 | c4742454-8ded-4625-af63-13bcf57fce5d | 794 | MicrosoftDefenderForEndpoint | 2022-12-13T12:29:46.8828457Z | 2022-12-13T12:35:25.2966667Z | null | 2022-12-13T12:18:09.0677744Z | 2022-12-13T12:18:09.0677744Z | 'Locky' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | New | Medium | 58 | PendingApproval | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | null | null | Locky | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "corp.local",
"firstSeen": "2022-12-13T12:00:53.459Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "50ffd07170283e077006618b8afafeaecc185857",
"onboardingStatus": "Onboarded",
"osBuild": 19... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "50ffd07170283e077006618b8afafeaecc185857",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-13T12:29:47.12Z",
"fileName": "TestFile_Block_Office_applications_from_creating... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:59:45.07Z | Suspicious | None | steve | rnd.local | S-1-5-21-2159906967-4174806019-1002223092-1107 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037514942796902_-2034195828 | 6d7820df-f578-4197-85e1-f4e4f54220fc | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:18:14.2797124Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:17:37.4983807Z | 2022-11-11T08:17:37.4983807Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:18:14.6166667Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:43.73Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 1,768 | type secret.txt | 2022-11-21T02:01:37.7396253Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:26:21.57Z | Suspicious | None | darol | vpn.zone | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638071377528766476_476927832 | da638071377528766476_476927832 | 970 | MicrosoftDefenderForEndpoint | 2022-12-20T12:55:52.8766803Z | 2022-12-20T12:55:54.05Z | null | 2022-12-20T12:52:35.3312494Z | 2022-12-20T12:52:35.6261961Z | CNN block | Block CNN | SuspiciousActivity | New | Medium | null | UnsupportedAlertType | null | null | CustomerTI | 360fdb3b-18a9-471b-9ad0-ad80a4cbcb02 | null | null | null | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "corp.local",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "4f111b3b2... | [
{
"aadUserId": null,
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-20T12:55:53.1166667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime"... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:11:31.19Z | Suspicious | None | jeff | internal.corp | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T20:57:06.41Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:10:33.65Z | Suspicious | None | root | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:19.8366667Z | Suspicious | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f309b61a8b005b5ce0a3fb58caaa798cfc95f5db | 3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748 | PSEXESVC.exe | C:\Windows | 3,844 | type secret.txt | 2022-11-11T08:17:34.3184356Z | 632 | 2022-11-11T08:13:27.8223756Z | services.exe | C:\Windows\System32 | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:20:34.4433333Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 684 | whoami /all | 2022-11-11T08:17:06.0049839Z | 4,704 | 2022-11-11T08:16:44.2952776Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638072962520261219_-35896655 | 8db98b94-6f48-4a07-b860-36675274a484 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:57:32.0261516Z | 2022-12-22T09:01:34.4133333Z | null | 2022-12-22T08:47:29.8275995Z | 2022-12-22T08:59:36.3706452Z | 'Kekeo' malware was detected during lateral movement | 'DefenderObservation.ThreatFamily' malware was detected on this device. An attacker might be attempting to move laterally to this device from another device on the network. | LateralMovement | New | Medium | 62 | PendingApproval | null | null | WindowsDefenderAtp | 7a6f0432-57d7-4a96-a286-0bd733ea425d | null | null | null | [
"T1543.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "On... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:57:32.0566667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:48:46.97Z | Benign | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:08:38.4733333Z | Suspicious | None | jeff | vpn.zone | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930249254436_-241984083 | 6178cdf4-3eee-4a5d-bb91-6984adeefb2d | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:44.9254621Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:01:36.9984727Z | 2022-11-21T02:33:54.0400057Z | Suspicious User Account Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1033",
"T1087",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:45.04Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152857659936_654223631 | 2153eef4-bddb-4c5b-bd71-d0c02e436753 | 486 | MicrosoftDefenderForEndpoint | 2022-09-30T06:14:45.7660137Z | 2022-11-19T01:35:42.7033333Z | 2022-10-01T01:36:00.5066667Z | 2022-09-30T06:11:51.4257849Z | 2022-09-30T06:11:51.5727687Z | Multiple dual-purpose tools were dropped | Multiple known public tools, which could also be used for malicious reasons were dropped on this device.
Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement. | LateralMovement | Resolved | High | 20 | TerminatedBySystem | TruePositive | SecurityTesting | WindowsDefenderAtp | e0e0ea40-b5ca-4cbf-8380-24119951f847 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1021",
"T1105",
"T1555",
"T1558.003",
"T1570"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:45.81Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072958361208636_-774564177 | dacbe670-c799-4085-9e4b-0c16dbfa3330 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:50:36.1208906Z | 2022-12-22T08:50:42.2233333Z | null | 2022-12-22T08:47:23.1371052Z | 2022-12-22T08:47:28.9843705Z | Suspicious Permission Groups Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | null | null | null | [
"T1069.001",
"T1069.002",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "staging.net",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa00868... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:50:36.15Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:56.8133333Z | Suspicious | None | admin | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | 4f4970c3545972fea2bc1984d597fc810e6321e0 | 25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369 | net.exe | C:\Windows\System32 | 5,556 | net.exe user /add BDAdmin Password1! | 2022-11-11T08:17:58.3155992Z | 6,240 | 2022-11-11T08:17:58.2692455Z | cmd.exe | C:\Windows\System32 | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:55.1233333Z | Suspicious | None | bob | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072957099294189_-1664704549 | fb76be7f-c418-4efc-a7e1-2e66fbf1ea4d | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:48:29.9294436Z | 2022-12-22T08:54:54.5066667Z | null | 2022-12-22T08:47:12.1411574Z | 2022-12-22T08:47:22.2861372Z | Suspicious RDP session | A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives. | SuspiciousActivity | New | High | 61 | PendingApproval | null | null | WindowsDefenderAtp | e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8 | null | null | null | [
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDev... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:29.9566667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime":... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T07:36:42.4766667Z | Suspicious | None | guest | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045935122751549_-904383286 | 0076e844-aa6c-422f-88ff-f975e13699a7 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:11:52.2751697Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:07:15.3883516Z | 2022-11-21T02:34:15.2385142Z | Suspicious service launched | A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device. | Execution | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | a5af9713-6eea-4d23-9bdc-9cab19f19092 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mda... | [] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037516158347999_762408514 | 311dfa90-c3dd-4c9e-89f9-70cb338c7786 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:20:15.8348224Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:17:35.9737654Z | 2022-11-11T08:17:35.9737654Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:15.89Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-15T14:00:39.1633333Z | Benign | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-11T08:19:04.5366667Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 2,420 | curl http://malicious | 2022-11-11T08:17:36.2207277Z | 4,704 | 2022-11-11T08:16:44.2952776Z | powershell.exe | \Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638037516341608392_-1607305193 | 79a46001-a5ce-457b-8ab6-b96a9de492f5 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:20:34.1608584Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:16:44.6919693Z | 2022-11-11T08:17:36.5981924Z | Suspicious Permission Groups Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1069.001",
"T1069.002",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:34.2166667Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T05:13:00.48Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 9,020 | dir C:\ | 2022-11-18T05:09:58.7146632Z | 4,976 | 2022-11-18T05:04:12.7150402Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638037516228377732_155258855 | c8cf2517-a330-48c8-b567-19fdf58e0a22 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:20:22.8377902Z | 2022-11-12T01:35:42.87Z | 2022-11-11T09:47:40.27713Z | 2022-11-11T08:07:33.1964484Z | 2022-11-11T08:17:05.7568492Z | Suspicious RDP session | A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives. | SuspiciousActivity | Resolved | High | 39 | SuccessfullyRemediated | TruePositive | SecurityTesting | WindowsDefenderAtp | e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8 | msftadmin@msdxv2.m365dpoc.com | null | null | [
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": null,
"accountName": "MSDXV2-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:22.8833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCrea... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T15:57:26.76Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-08T10:35:29.3966667Z | Unknown | None | darol | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045931471513680_-728742532 | 1fe2d53f-2f71-4007-b545-94c136e5eeda | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:05:47.1514001Z | 2022-11-21T02:34:51.2733333Z | null | 2022-11-21T02:02:06.7577322Z | 2022-11-21T02:33:22.1944641Z | Possible use of the Rubeus kerberoasting tool | Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication.
During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets. | SuspiciousActivity | New | Medium | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 6606ef29-d293-4f24-a7c5-334dcb40b412 | null | null | null | [
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:05:47.19Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-09-30T06:14:45.93Z | Suspicious | None | jeff | prod.env | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045935122751549_-904383286 | 0076e844-aa6c-422f-88ff-f975e13699a7 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:11:52.2751697Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:07:15.3883516Z | 2022-11-21T02:34:15.2385142Z | Suspicious service launched | A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device. | Execution | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | a5af9713-6eea-4d23-9bdc-9cab19f19092 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1569.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd... | [
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:11:52.32Z",
"fileName": "PSEXESVC.exe",
"filePath": "... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:03:43.66Z | Suspicious | None | jeff | staging.net | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930197988588_1186202648 | c52b7885-2e29-4f29-82f5-6e8e57126bfc | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:03:39.7988758Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:01:36.9984727Z | 2022-11-21T02:32:59.2274059Z | Anomalous account lookups | An anomalous chain of attempts to look up user account information has been observed. An attacker might be gathering information about potential targets. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | ad0494b0-6cfa-4ba2-9285-706fd414acd8 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1033",
"T1069.001",
"T1069.002",
"T1087",
"T1087.001",
"T1087.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:03:39.97Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037543503645302_122167875 | da638037543503645302_122167875 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T09:05:50.364655Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:15:02.3869452Z | 2022-11-11T08:15:02.3869452Z | Suspicious URL clicked | A user opened a potentially malicious URL. This alert was triggered based on a Microsoft Defender for Office 365 alert. | InitialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | MTP | 359b36eb-337c-4f1c-b280-8c5e08f9c4a0 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1566.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-11T09:05:50.6533333Z",
"fileName": "outlook.exe",
"filePath": "",
"ipAddress": null,
"parentProcessCreationTime"... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:14:46.24Z | Suspicious | Active | analyst | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 6,464 | "mimikatz.exe" "lsadump::dcsync /domain:msdxv2.m365dpoc.com /user:krbtgt" exit | 2022-09-30T06:13:06.6052353Z | 4,064 | 2022-09-30T06:11:13.210308Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638072963590599097_-155424872 | 4e390f1a-feee-4335-8b29-fbd8c684cae3 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:59:19.0599291Z | 2022-12-22T08:59:19.6066667Z | null | 2022-12-22T08:47:53.8045023Z | 2022-12-22T08:47:53.8045023Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | null | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "lab.net",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 177... | [
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:59:19.0966667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime":... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072962440564421_38923631 | bdbef9b4-af97-4ac8-812b-2d008732fb04 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:57:24.0564629Z | 2022-12-22T08:59:28.19Z | null | 2022-12-22T08:47:52.0649455Z | 2022-12-22T08:47:52.0657273Z | Possible use of the Rubeus kerberoasting tool | Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication.
During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets. | SuspiciousActivity | New | Medium | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 6606ef29-d293-4f24-a7c5-334dcb40b412 | null | null | null | [
"T1558.003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": ... | [
{
"aadUserId": null,
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:57:24.1Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-21T02:04:34.8433333Z | Suspicious | None | bob | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-16T09:08:30.79Z | Benign | None | SYSTEM | NT AUTHORITY | S-1-5-18 | null | null | f43d9bb316e30ae1a3494ac5b0624f6bea1bf054 | 9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 8,912 | powershell.exe -ExecutionPolicy AllSigned -NoProfile -NonInteractive -Command "& {$OutputEncoding = [Console]::OutputEncoding =[System.Text.Encoding]::UTF8;$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\AntiVirus.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '1c0f9c9177787b3146332dd0f112444d3062214f6e71e1a4bc16b1fb55818a86')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\EDR.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq 'f84b9499bd9dc40b993886d328828a2ed82541e54b76f9cb9e04c007eb97d8be')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\Firewall.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '2490d8e22c01e09f99c8e32a044d6c150e75e8e75028809f73fffd9d3bf4ed92')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\GroupPolicyObject.psm1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '5b251a22c68070bcb6be4c85e71232067581fa1483ce767e2e9fbe98a4db0229')) { exit 323;};$scriptFileStream = [System.IO.File]::Open('C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1', [System.IO.FileMode]::Open, [System.IO.FileAccess]::Read, [System.IO.FileShare]::Read);$calculatedHash = Get-FileHash 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' -Algorithm SHA256;if (!($calculatedHash.Hash -eq '13ff49e1e4a5017ae784cbe39648f9f18af975c2ce9616d52d7d7b32bec05e50')) { exit 323;}; . 'C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\SenseCM\PolicyEnforcer.ps1' }" | 2022-11-16T09:04:33.0593386Z | 7,224 | 2022-11-16T09:04:31.5834723Z | SenseCM.exe | C:\Program Files\Windows Defender Advanced Threat Protection | Detected | 36150b3c1b69b5c2da9df4efd86ac6c166924a48 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:15:59.7633333Z | Suspicious | Active | steve | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | ded8fd7f36417f66eb6ada10e0c0d7c0022986e9 | bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527 | cmd.exe | C:\Windows\System32 | 3,132 | "cmd" /c "net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\"" && net.exe start ntds" | 2022-09-30T06:13:29.1932614Z | 7,308 | 2022-09-30T06:13:28.5321636Z | PSEXESVC.exe | C:\Windows | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-09-30T06:15:47.8633333Z | Suspicious | Active | steve | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 840 | powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\"" | 2022-09-30T06:13:42.2990117Z | 3,132 | 2022-09-30T06:13:29.1932614Z | cmd.exe | C:\Windows\System32 | Detected | e138ecd8e7b21eaf952cb35d56349bf50c64ac96 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T13:27:33.96Z | Suspicious | None | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043451229455168_134866268 | ae3bb072-e90e-42fc-adf9-345144720e65 | 741 | MicrosoftDefenderForEndpoint | 2022-11-18T05:12:02.9455314Z | 2022-11-19T01:35:46.6533333Z | 2022-11-19T01:35:46.5533333Z | 2022-11-18T05:10:15.2094768Z | 2022-11-18T05:14:15.9918082Z | Possible use of the Rubeus kerberoasting tool | Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication.
During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets. | SuspiciousActivity | Resolved | Medium | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 6606ef29-d293-4f24-a7c5-334dcb40b412 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1558.003"
] | [
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "M... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:12:02.97Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037516341608392_-1607305193 | 79a46001-a5ce-457b-8ab6-b96a9de492f5 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:20:34.1608584Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:16:44.6919693Z | 2022-11-11T08:17:36.5981924Z | Suspicious Permission Groups Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | Resolved | Low | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1069.001",
"T1069.002",
"T1087.001"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:34.2166667Z",
"fileName": null,
"filePath": null,
"ipAddre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T04:44:34.4Z | Suspicious | None | Takeshi | lab.net | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:24:15.04Z | Suspicious | None | hacker | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T04:44:38.9333333Z | Benign | None | Takeshi | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T04:44:38.56Z | Suspicious | None | Takeshi | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | 76866dde54ee3fa5bc8efefb9d44e6bf859973aa | afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91 | net.exe | C:\Windows\System32 | 17,344 | type secret.txt | 2022-11-18T04:38:44.7323003Z | 14,616 | 2022-11-14T04:36:16.5242809Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 83b06aa80899050e5d4132992e36b5b8f14b64e9 |
aa0bf3e5da-67d0-4cd4-a60c-d1ec8b17906e | 0bf3e5da-67d0-4cd4-a60c-d1ec8b17906e | 765 | MicrosoftDefenderForIdentity | 2022-11-21T02:07:45.9143894Z | 2022-11-21T02:07:51.7233333Z | null | 2022-11-21T02:01:35.967662Z | 2022-11-21T02:05:28.399996Z | Suspected overpass-the-hash attack (Kerberos) | Ron Henderson (Helpdesk Administrator) on MSDXV2-Win10V successfully authenticated against MSDXV2-DC. | DefenseEvasion | New | High | null | UnsupportedAlertType | null | null | AzureATP | AbnormalKerberosOverpassTheHashSecurityAlert | null | null | null | [
"T1550",
"T1550.002"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "lab.net",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": ... | [
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:07:46.14Z",
"fileName": null,
"filePath": null,
"ipAddress":... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638065141690799395_574213459 | cdeae75b-8c21-4259-b37e-f8659c85a5f6 | 794 | MicrosoftDefenderForEndpoint | 2022-12-13T07:42:49.0799617Z | 2022-12-13T07:51:49.87Z | 2022-12-13T07:51:49.6590458Z | 2022-12-13T07:29:32.109068Z | 2022-12-13T07:29:32.109068Z | 'Encryptest' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | Resolved | Medium | 57 | SuccessfullyRemediated | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | Automation | null | Encryptest | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "master-win10b.master.m365dpoc.com",
"firstSeen": "2022-12-13T07:14:16.856Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"onboardingStatus": "Onboar... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-13T07:42:49.13Z",
"fileName": "ransomware_testfile_unsigned.exe",
"filePath... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-19T02:34:25.7533333Z | Suspicious | None | admin | null | S-1-5-21-2300221942-1987151257-321556088-1104 | null | null | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | 7,228 | powershell.exe -command " $Process = New-Object System.Diagnostics.Process; $Process.StartInfo.FileName = 'https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fggegbcd.companyportal.cloud%2Faccb%2Fhbcbaefjanbegh&data=05%7C01%7Cjeff%40msdxv2.m365dpoc.com%7Cee62a5acae6648e2586608dac9cf3b8b%7C1a49212958c8401191cd245285f5345c%7C0%7C0%7C638044189166181002%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=vl4QrtOOlKwiHKzXx23XZ8qZlInU73CMdOSBq0EspY4%3D&reserved=0'; $Process.StartInfo.UseShellExecute = $true; $Process.Start() | Out-Null; " | 2022-11-19T02:08:50.3807445Z | 11,120 | 2022-11-19T02:08:50.3566833Z | null | null | null | null | |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:12:02.97Z | Suspicious | None | user1 | MSDXV2 | S-1-5-21-2300221942-1987151257-321556088-1111 | 89b6fc86-af84-47b2-a72d-325362598b2c | ronhd@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-11T08:19:56.86Z | Suspicious | None | alice | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1107 | 0808dea1-2ec8-41d2-8e3e-7c18309fab09 | steve@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072963840442395_-844287814 | c252fa0a-99c0-4b80-98cc-815e7355a801 | 975 | MicrosoftDefenderForEndpoint | 2022-12-22T08:59:44.0442585Z | 2022-12-22T09:25:44.5166667Z | null | 2022-12-22T08:27:59.3887959Z | 2022-12-22T08:48:37.3250678Z | Suspicious System Network Connections Discovery | A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks. | Discovery | New | Low | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | 9bfe28a9-21eb-4f8a-b51e-38ebd3650c88 | null | null | null | [
"T1049",
"T1106",
"T1135"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv8-dc.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:05:46.8493187Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV8"
}
],
... | [
{
"aadUserId": null,
"accountName": "Defender",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:59:44.0733333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTi... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-21T04:54:50.71Z | Suspicious | None | steve | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1107 | null | steve@msdxv8.m365dpoc.com | 0a43ff3773e7fcbb9a98029957c41bc3af56ae94 | d2ae715f046aec3fccbfb4fe9624fa0c5b5cf45622ca2ace26de9f56552aebe2 | chrome.exe | C:\Program Files\Google\Chrome\Application | 11,548 | ipconfig | 2022-12-21T04:51:32.1204974Z | 10,208 | 2022-12-21T04:51:30.5564156Z | chrome.exe | C:\Program Files\Google\Chrome\Application | Detected | 4f111b3b2366eacdcc66d7ad73548fff9b039c15 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-13T22:00:04.93Z | Suspicious | None | darol | vpn.zone | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-08T11:27:28.7866667Z | Suspicious | None | analyst | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-18T04:51:48.7833333Z | Suspicious | Active | operator | TMTOWER-BOOK | S-1-5-21-7316772-2057538409-3008203053-1001 | null | null | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 11,108 | "mimikatz.exe" privilege::debug "kerberos::ptt C:\M365DAttack\Admin-Tickets" exit | 2022-11-18T04:48:53.2444004Z | 14,616 | 2022-11-14T04:36:16.5242809Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 83b06aa80899050e5d4132992e36b5b8f14b64e9 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-16T15:26:50.78Z | Suspicious | None | alice | NT AUTHORITY | S-1-5-18 | null | null | 069beb39e03b378493f1a2db5113c3ef62216a46 | fddc5f29f779a6ef73d70a2c551397fdee63f549f2bce4fe6a7aeedc11f4f72e | net.exe | C:\Windows\System32 | 4,748 | "net.exe" accounts | 2022-11-16T10:05:18.6390263Z | 912 | 2022-11-16T10:04:38.1400707Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7114973b832b32d349815a5d2811738cc10fa650 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:40.3033333Z | Suspicious | None | guest | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 7,452 | "mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait | 2022-11-21T02:01:44.2419747Z | 11,068 | 2022-11-21T02:01:28.4753286Z | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-12-22T09:30:44.15Z | Suspicious | None | jeff | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-1104 | null | jeff@msdxv8.m365dpoc.com | 70df765f554ed7392200422c18776b8992c09231 | 912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9 | mimikatz.exe | C:\M365DAttack\Mimikatz\x64 | 4,284 | powershell -enc ZABpAHIA | 2022-12-22T09:28:43.3962562Z | 5,408 | 2022-12-22T09:07:41.4690585Z | powershell_ise.exe | \Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0 | Detected | 7ba8aa008687dd62d639cb45b52c7c9f971c65c1 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-22T08:59:44.16Z | Suspicious | None | guest | MSDXV8 | S-1-5-21-2159906967-4174806019-1002223092-500 | null | Defender@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:05:47.19Z | Suspicious | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 6cbce4a295c163791b60fc23d285e6d84f28ee4c | de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c | powershell.exe | C:\Windows\System32\WindowsPowerShell\v1.0 | 11,616 | powershell.exe C:\M365DAttack\Get-KRBTicket.ps1 | 2022-11-21T02:01:44.3957302Z | 7,452 | 2022-11-21T02:01:44.2419747Z | null | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638045932869405772_-745641302 | e8cc923b-7240-462d-967e-3c399c11cfc7 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:08:06.9406021Z | 2022-11-21T02:08:07.48Z | null | 2022-11-21T02:06:56.8448435Z | 2022-11-21T02:06:56.8448435Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | New | High | null | UnsupportedAlertType | null | null | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | null | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "internal.corp",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:08:06.97Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:41.86Z | Suspicious | Active | user1 | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d | 8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b | explorer.exe | C:\Windows | 4,680 | Explorer.EXE | 2022-11-10T07:07:26.0872385Z | 4,684 | 2022-11-10T07:07:25.9825113Z | userinit.exe | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-21T04:54:51.0633333Z | Suspicious | None | steve | lab.net | S-1-5-21-2159906967-4174806019-1002223092-1107 | null | steve@msdxv8.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045932869405772_-745641302 | e8cc923b-7240-462d-967e-3c399c11cfc7 | 765 | MicrosoftDefenderForEndpoint | 2022-11-21T02:08:06.9406021Z | 2022-11-26T01:35:43.17Z | 2022-11-26T01:35:43.0633333Z | 2022-11-21T02:06:56.8448435Z | 2022-11-21T02:06:56.8448435Z | Malicious credential theft tool execution detected | A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more. | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | f5d3c5d8-ec3a-4412-ab45-934d8faff42c | takeshi@msdxv2.m365dpoc.com | null | null | [
"T1003"
] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDev... | [
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:08:06.97Z",
"fileName": null,
"filePath": null,
"ipAddress": ... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:09:16.8666667Z | Suspicious | None | analyst | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-14T17:09:16.3333333Z | Suspicious | None | darol | corp.local | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638065141686521349_2047697489 | b33768d8-fd93-48bd-893f-96f4deb2e1f1 | 794 | MicrosoftDefenderForEndpoint | 2022-12-13T07:42:48.6521597Z | 2022-12-13T07:51:49.87Z | 2022-12-13T07:51:49.6590458Z | 2022-12-13T07:29:32.3122092Z | 2022-12-13T07:29:32.3122092Z | 'Locky' ransomware was prevented | Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection. | Ransomware | Resolved | Medium | 57 | SuccessfullyRemediated | null | null | WindowsDefenderAv | 51d03c45-b142-4de4-95df-01b0c259d8f6 | Automation | null | Locky | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "master-win10b.master.m365dpoc.com",
"firstSeen": "2022-12-13T07:14:19.242439Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"onboardingStatus": "Onb... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-13T07:42:48.6966667Z",
"fileName": "TestFile_Block_Office_applications_from_cre... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | Process | 2022-11-21T02:03:41.86Z | Suspicious | Active | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | 56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d | 8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b | explorer.exe | C:\Windows | 4,680 | ipconfig | 2022-11-10T07:07:26.0872385Z | 4,684 | 2022-11-10T07:07:25.9825113Z | userinit.exe | null | Detected | c7e147cb0eb3534a4dcea5acb8e61c933713b145 |
da638037516160339093_1896049680 | 7c97aeea-563f-40bd-b296-108ae6d9b0d1 | 686 | MicrosoftDefenderForEndpoint | 2022-11-11T08:20:16.0339305Z | 2022-11-12T01:35:43.1766667Z | 2022-11-12T01:35:42.84Z | 2022-11-11T08:17:35.8244093Z | 2022-11-11T08:17:35.8244093Z | Pass-the-ticket attack | A .kirbi file, a known file extension for Kerberos tickets containing local authenticated users credentials, was observed being created on the machine. This behavior might be associated with an attacker trying to move laterally in the network using stolen user credentials as part of Pass-The-Tickets” attack | CredentialAccess | Resolved | High | null | UnsupportedAlertType | TruePositive | SecurityTesting | WindowsDefenderAtp | dc47cd98-e905-40ed-ac04-59c4ff6b97ee | takeshi@msdxv2.m365dpoc.com | null | null | [] | [
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "test.domain",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb35... | [
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-11T08:20:16.07Z",
"fileName": "ticket.kirbi",
"filePath": "C:\\M365DAttack\\... | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-12-08T11:03:51.59Z | Suspicious | None | analyst | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1110 | 598763ac-48bb-4671-9472-6be219756e33 | darol@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | User | 2022-11-18T05:10:39.1833333Z | Benign | None | jeff | msdxv2.m365dpoc | S-1-5-21-2300221942-1987151257-321556088-1104 | e848b07a-87af-4448-9979-09f0b809c8d4 | jeff@msdxv2.m365dpoc.com | null | null | null | null | null | null | null | null | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.