alertId
stringclasses
278 values
providerAlertId
stringclasses
278 values
incidentId
int64
486
989
serviceSource
stringclasses
2 values
creationTime
stringdate
2022-09-30 05:04:51
2023-01-24 06:03:50
lastUpdatedTime
stringdate
2022-11-12 01:35:42
2023-01-24 06:05:47
resolvedTime
stringclasses
23 values
firstActivity
stringdate
2022-09-07 09:25:00
2023-01-24 05:31:07
lastActivity
stringdate
2022-09-30 05:00:00
2023-01-24 05:43:53
title
stringclasses
62 values
description
stringclasses
51 values
category
stringclasses
12 values
status
stringclasses
2 values
severity
stringclasses
4 values
investigationId
int64
20
64
investigationState
stringclasses
9 values
classification
stringclasses
1 value
determination
stringclasses
1 value
detectionSource
stringclasses
7 values
detectorId
stringclasses
48 values
assignedTo
stringclasses
3 values
actorName
stringclasses
1 value
threatFamilyName
stringclasses
6 values
mitreTechniques
listlengths
0
8
devices
listlengths
1
6
entities
listlengths
0
49
entityType
stringclasses
2 values
evidenceCreationTime
stringclasses
469 values
verdict
stringclasses
5 values
remediationStatus
stringclasses
2 values
accountName
stringclasses
30 values
domainName
stringclasses
17 values
userSid
stringclasses
22 values
aadUserId
stringclasses
8 values
userPrincipalName
stringclasses
14 values
sha1
stringclasses
28 values
sha256
stringclasses
27 values
fileName
stringclasses
21 values
filePath
stringclasses
13 values
processId
int64
0
20.7k
processCommandLine
stringclasses
67 values
processCreationTime
stringclasses
133 values
parentProcessId
int64
0
14.6k
parentProcessCreationTime
stringclasses
63 values
parentProcessFileName
stringclasses
14 values
parentProcessFilePath
stringclasses
11 values
detectionStatus
stringclasses
1 value
deviceId
stringclasses
9 values
da638001153088730569_1093802277
0cf8fa01-8fbb-4476-a8df-1514deded2ec
486
MicrosoftDefenderForEndpoint
2022-09-30T06:15:08.8730773Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:10:55.1361741Z
2022-09-30T06:11:51.5727687Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
Resolved
High
20
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021.001", "T1555", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "vpn.zone", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a...
[ { "aadUserId": null, "accountName": "MSDXV2-Win10V$", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:15:08.9233333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCrea...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:55.1233333Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515790902965_1802135643
e8c36505-2a63-4dbe-8d0e-a930ffd7a47b
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:39.0903155Z
2022-11-18T00:39:00.6933333Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:13.2923676Z
2022-11-11T08:17:34.312333Z
Suspicious file registered as a service
A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence.
Persistence
Resolved
Medium
36
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
d15c9f84-aabc-46e5-a92e-7bb3ce5eceda
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1074.002", "T1543.003", "T1569.002", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:39.2166667Z", "fileName": null, "filePath": null, "ipAddress": nul...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:48:46.97Z
Suspicious
None
jeff
lab.net
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:58:22.4333333Z
Suspicious
None
ronhd
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1111
null
ronhd@msdxv8.m365dpoc.com
fc870d086c53ded2e94300f7569aa9478186f2c7
a1fddd460edd35ed449d32cc43bc15675c48a314a6fa5fb158e3bc4fea460be1
Rubeus.exe
C:\Temp
2,536
whoami /all
2022-12-22T08:47:51.8048258Z
5,228
2022-12-22T08:47:51.6930217Z
cmd.exe
C:\Windows\System32
Detected
4f111b3b2366eacdcc66d7ad73548fff9b039c15
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:11:51.46Z
Unknown
Active
steve
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
ded8fd7f36417f66eb6ada10e0c0d7c0022986e9
bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527
cmd.exe
C:\Windows\System32
3,020
"cmd" /c "net.exe user /add BDAdmin Password1! && net.exe stop ntds /y && powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\"" && net.exe start ntds"
2022-11-21T02:07:15.6313121Z
7,232
2022-11-21T02:07:15.1389846Z
PSEXESVC.exe
C:\Windows
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:11:51.33Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:14:25.5266667Z
Benign
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
8,844
"mimikatz.exe" privilege::debug "lsadump::backupkeys /system:msdxv2-dc.msdxv2.m365dpoc.com /export" exit
2022-11-21T02:02:27.0051694Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638045931470659526_1077639846
58f9697c-4be9-4140-af1f-34d50cbbe085
765
MicrosoftDefenderForEndpoint
2022-11-21T02:05:47.0659755Z
2022-11-21T02:17:47.6433333Z
null
2022-11-21T02:02:27.1005817Z
2022-11-21T02:15:09.1240511Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:05:47.11Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072958361208636_-774564177
dacbe670-c799-4085-9e4b-0c16dbfa3330
975
MicrosoftDefenderForEndpoint
2022-12-22T08:50:36.1208906Z
2022-12-22T08:50:42.2233333Z
null
2022-12-22T08:47:23.1371052Z
2022-12-22T08:47:28.9843705Z
Suspicious Permission Groups Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1069.001", "T1069.002", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "malicious.io", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa0086...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:50:36.15Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:20:15.79Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,556
dir C:\
2022-11-11T08:17:12.3967497Z
4,704
2022-11-11T08:16:44.2952776Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:04:34.8433333Z
Suspicious
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
5,760
netstat -an
2022-11-21T02:02:27.7361869Z
620
2022-11-16T03:32:19.0279725Z
services.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:19:04.5766667Z
Suspicious
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
5,180
type secret.txt
2022-11-11T08:17:36.6575476Z
4,704
2022-11-11T08:16:44.2952776Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:16:01.64Z
Suspicious
None
SYSTEM
NT AUTHORITY
S-1-5-18
null
null
f309b61a8b005b5ce0a3fb58caaa798cfc95f5db
3c19fee379b4882971834a3d38f3f8b86de560114274375560433778cd505748
PSEXESVC.exe
C:\Windows
8,072
PSEXESVC.exe
2022-09-30T06:13:03.9136767Z
624
2022-09-15T03:19:37.3201866Z
services.exe
C:\Windows\System32
Detected
36150b3c1b69b5c2da9df4efd86ac6c166924a48
aa0bf3e5da-67d0-4cd4-a60c-d1ec8b17906e
0bf3e5da-67d0-4cd4-a60c-d1ec8b17906e
765
MicrosoftDefenderForIdentity
2022-11-21T02:07:45.9143894Z
2022-11-26T01:38:29.64Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:01:35.967662Z
2022-11-21T02:05:28.399996Z
Suspected overpass-the-hash attack (Kerberos)
Ron Henderson (Helpdesk Administrator) on MSDXV2-Win10V successfully authenticated against MSDXV2-DC.
DefenseEvasion
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
AzureATP
AbnormalKerberosOverpassTheHashSecurityAlert
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1550", "T1550.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "msdxv2-dc.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "onboardingStatus": "Onboa...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:07:46.14Z", "fileName": null, "filePath": null, "ipAddress":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930661007015_1390205570
110e581a-b121-4c70-b48a-e5d68fd5e1aa
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:26.100718Z
2022-11-21T02:13:43.9433333Z
null
2022-11-21T02:02:29.8592876Z
2022-11-21T02:11:53.0116481Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "staging.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb35...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:26.1266667Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:11:51.33Z
Suspicious
None
guest
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-21T04:54:51.0633333Z
Malicious
None
steve
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:12:05.5433333Z
Suspicious
None
hacker
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:19:56.8133333Z
Suspicious
None
steve
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
5,556
dir C:\
2022-11-11T08:17:58.3155992Z
6,240
2022-11-11T08:17:58.2692455Z
cmd.exe
C:\Windows\System32
Detected
e138ecd8e7b21eaf952cb35d56349bf50c64ac96
da638043451229455168_134866268
ae3bb072-e90e-42fc-adf9-345144720e65
741
MicrosoftDefenderForEndpoint
2022-11-18T05:12:02.9455314Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:10:15.2094768Z
2022-11-18T05:14:15.9918082Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1558.003" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "M...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:12:02.97Z", "fileName": null, "filePath": null, "ipAddress": null, ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:14:52.3Z
Unknown
Active
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
4f4970c3545972fea2bc1984d597fc810e6321e0
25c8266d2bc1d5626dcdf72419838b397d28d44d00ac09f02ff4e421b43ec369
net.exe
C:\Windows\System32
7,588
"net.exe" user /domain
2022-09-30T06:11:51.8945322Z
4,064
2022-09-30T06:11:13.210308Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638001152368929144_695584973
641d3076-7cae-4a93-830d-1b38c988e610
486
MicrosoftDefenderForEndpoint
2022-09-30T06:13:56.8929409Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:06.1839452Z
2022-09-30T06:13:06.1839452Z
Mimikatz credential theft tool
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
CredentialAccess
Resolved
High
20
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAv
8cac979e-6dcc-44ad-8355-480eebaff1c1
msftadmin@msdxv2.m365dpoc.com
null
Mimikatz
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-09-30T06:13:56.9233333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAtt...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:15:19.35Z
Suspicious
None
jeff
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072970422431887_-1103735379
dd44b653-cbb4-4925-87a9-a403d1e588b5
975
MicrosoftDefenderForEndpoint
2022-12-22T09:10:42.2432103Z
2022-12-22T09:11:25.2633333Z
null
2022-12-22T09:05:21.3317297Z
2022-12-22T09:08:59.147227Z
Suspicious Process Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1057", "T1059.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboar...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T09:10:42.28Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638044220656140437_-335481736
da638044220656140437_-335481736
752
MicrosoftDefenderForEndpoint
2022-11-19T02:34:25.6141633Z
2022-11-26T01:35:42.9466667Z
2022-11-26T01:35:42.72Z
2022-11-19T02:08:50.7662133Z
2022-11-19T02:08:50.7662133Z
Suspicious URL clicked
A user opened a potentially malicious URL. This alert was triggered based on a Microsoft Defender for Office 365 alert.
InitialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
MTP
359b36eb-337c-4f1c-b280-8c5e08f9c4a0
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1566.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-19T02:34:25.7533333Z", "fileName": "powershell.exe", "filePath": "", "ipAddress": null, "parentProcessCreat...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045931511124826_-2037955442
72e5ed84-28b4-4e06-b94e-0fc890c34332
765
MicrosoftDefenderForEndpoint
2022-11-21T02:05:51.1125047Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T01:55:47.8840459Z
2022-11-21T02:02:27.3917772Z
Suspicious System Owner/User Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1059.001", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:05:51.15Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:39.9733333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
3,516
ipconfig
2022-11-21T02:01:38.4465922Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T21:46:07.81Z
Suspicious
None
operator
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963026499465_1469012925
8c0c6243-34ce-45ce-a756-bfdc837ffa12
975
MicrosoftDefenderForEndpoint
2022-12-22T08:58:22.6499651Z
2022-12-22T08:59:28.19Z
null
2022-12-22T08:47:29.6780551Z
2022-12-22T08:47:52.0649455Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
New
Medium
62
PendingApproval
null
null
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
null
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10b.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T01:04:21.9057174Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "4f111b3b2366eacdcc66d7ad73548fff9b039c15", "onboardingStatus": "On...
[ { "aadUserId": null, "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:58:22.77Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": nul...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:44:39.0033333Z
Benign
None
null
null
null
null
null
null
null
Code.exe
\Device\HarddiskVolume3\Users\Takeshi\AppData\Local\Programs\Microsoft VS Code
12,136
null
2022-11-14T04:36:09.1457881Z
null
null
null
null
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T13:50:37.33Z
Benign
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930197988588_1186202648
c52b7885-2e29-4f29-82f5-6e8e57126bfc
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:39.7988758Z
2022-11-21T02:34:52.3333333Z
null
2022-11-21T02:01:36.9984727Z
2022-11-21T02:32:59.2274059Z
Anomalous account lookups
An anomalous chain of attempts to look up user account information has been observed. An attacker might be gathering information about potential targets.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
ad0494b0-6cfa-4ba2-9285-706fd414acd8
null
null
null
[ "T1033", "T1069.001", "T1069.002", "T1087", "T1087.001", "T1087.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "internal.corp", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:39.97Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:19:35.2Z
5
None
svc_acct
null
S-1-5-21-2300221942-1987151257-321556088-502
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-12T07:38:15.09Z
Suspicious
None
root
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638001152874467378_-523357944
fd933a37-d34a-47b5-9601-bc90c711b665
486
MicrosoftDefenderForEndpoint
2022-09-30T06:14:47.4467617Z
2022-11-19T01:35:42.7033333Z
2022-10-01T01:36:00.5066667Z
2022-09-30T06:13:09.3768584Z
2022-09-30T06:13:09.3768584Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
Resolved
High
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
msftadmin@msdxv2.m365dpoc.com
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-09-30T06:14:47.4866667Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-12T13:46:04.6533333Z
Suspicious
None
darol
vpn.zone
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:04:35.09Z
Suspicious
None
bob
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638095379384888126_1704408332
def7d493-d355-4821-a380-4e84a09156ec
984
MicrosoftDefenderForEndpoint
2023-01-17T07:38:58.4888386Z
2023-01-17T07:44:35.38Z
null
2023-01-17T07:26:36.8886489Z
2023-01-17T07:26:36.8886489Z
'Donoff' malware was prevented
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks. This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Malware
New
Informational
64
PartiallyRemediated
null
null
WindowsDefenderAv
d60f5b90-ecd8-4d77-8186-a801597ec762
null
null
Donoff
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "malicious.io", "firstSeen": "2023-01-17T07:15:11.3017269Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5", "onboardingStatus": "Onboarded", "osBuil...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5", "domainName": null, "entityType": "File", "evidenceCreationTime": "2023-01-17T07:38:58.72Z", "fileName": "TestFile_OfficeChildProcess_D4F940AB-401B-4EFC-A...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:08:06.97Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,948
ping 127.0.0.1
2022-11-21T02:06:53.9715954Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
\Device\HarddiskVolume4\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638045931470659526_1077639846
58f9697c-4be9-4140-af1f-34d50cbbe085
765
MicrosoftDefenderForEndpoint
2022-11-21T02:05:47.0659755Z
2022-11-21T02:17:47.6433333Z
null
2022-11-21T02:02:27.1005817Z
2022-11-21T02:15:09.1240511Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "prod.env", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:05:47.11Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:07:49.8666667Z
Suspicious
None
jeff
rnd.local
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:44:38.9333333Z
Suspicious
None
Takeshi
vpn.zone
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043450423274993_-461812340
38ac9487-a71e-4166-83d3-b042245e378e
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:42.32752Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T04:58:54.4532335Z
2022-11-18T05:13:27.6605742Z
Suspicious RDP session
A combination of several suspicious RDP session activities has been detected in this device. Attackers might be attempting to establish a foothold in the environment by using various reconnaissance and persistence methods, then evade detection by tampering with and turning off security features to complete their objectives.
SuspiciousActivity
Resolved
High
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAtp
e3270960-77a9-4f2b-a6ba-ea6a9d5e86d8
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1003", "T1021.001", "T1555", "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4...
[ { "aadUserId": null, "accountName": "MSDXV2-Win10V$", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:10:42.37Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationT...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:10:38.4Z
Suspicious
None
jeff
internal.corp
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515507445396_1217377639
ef22de97-109c-48f5-afcc-938c1ddfbcd5
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:10.7445617Z
2022-11-12T01:35:42.87Z
2022-11-11T09:47:40.27713Z
2022-11-11T08:17:09.0417181Z
2022-11-11T08:17:39.4979706Z
Mimikatz credential theft tool
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
CredentialAccess
Resolved
High
39
SuccessfullyRemediated
TruePositive
SecurityTesting
WindowsDefenderAv
8cac979e-6dcc-44ad-8355-480eebaff1c1
msftadmin@msdxv2.m365dpoc.com
null
Mimikatz
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-11T08:19:10.7833333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAtt...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:15:08.81Z
Suspicious
None
jeff
test.domain
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:05:47.3Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T09:30:33.92Z
Suspicious
None
root
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
044ca0fecf2436aac3f9e7acc3c97b30588c594d
77b4c0f9929073ce132223f3169349f3e7a626c392b7dbc1a39fa89265c2c6bf
powershell_ise.exe
C:\Windows\System32\WindowsPowerShell\v1.0
5,408
"PowerShell_ISE.exe"
2022-12-22T09:07:41.4690585Z
2,980
2022-12-22T09:05:20.1978737Z
explorer.exe
C:\Windows
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:03:43.66Z
Malicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-14T17:44:25.91Z
Suspicious
None
svc_acct
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:42:55.3033333Z
Malicious
None
Takeshi
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
10,396
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
2022-11-18T04:38:47.7166801Z
14,616
2022-11-14T04:36:16.5242809Z
powershell.exe
\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
da638043451255718702_26524107
248fe27b-de9b-4a10-a550-6bcebfe83b44
741
MicrosoftDefenderForEndpoint
2022-11-18T05:12:05.5718949Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:32.0366644Z
2022-11-18T05:14:15.9874335Z
File dropped and launched from remote location
A remote session dropped a file and executed it. An attacker or a malware might be an attempting move laterally or propagate.
LateralMovement
Resolved
Medium
49
PendingApproval
TruePositive
SecurityTesting
WindowsDefenderAtp
17d50613-c135-4981-858e-86cdecb4e46e
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1105", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "staging.net", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], ...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-18T05:12:05.72Z", "fileName": null, "filePath": null, "ipAddress": null, ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:33.7633333Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,500
type secret.txt
2022-11-18T05:09:31.2191789Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638037516153050151_-2032732023
5f10445d-f5c8-48b6-b412-38971bef3c6b
686
MicrosoftDefenderForEndpoint
2022-11-11T08:20:15.3050338Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:13.3984128Z
2022-11-11T08:17:13.3984128Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1558.003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb35...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:20:15.35Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930661007015_1390205570
110e581a-b121-4c70-b48a-e5d68fd5e1aa
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:26.100718Z
2022-11-21T02:13:43.9433333Z
null
2022-11-21T02:02:29.8592876Z
2022-11-21T02:11:53.0116481Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:26.1266667Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-11T15:46:46.2866667Z
Suspicious
None
operator
null
S-1-12-1-2269820315-1261997569-3294602117-2733835123
874ab59b-8e01-4b38-85a3-5fc47303f3a2
msftadmin@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043450424844453_1508847464
3c8e366d-e1d2-4279-8afa-696d70f2736c
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:42.4844653Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:24.6257114Z
2022-11-18T05:10:02.6736516Z
Mimikatz credential theft tool
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
CredentialAccess
Resolved
High
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAv
8cac979e-6dcc-44ad-8355-480eebaff1c1
takeshi@msdxv2.m365dpoc.com
null
Mimikatz
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:42.51Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043434759404491_-809683511
86174ec6-d919-4e87-aef4-e698a19de13a
741
MicrosoftDefenderForEndpoint
2022-11-18T04:44:35.9404652Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T04:38:44.8301282Z
2022-11-18T04:48:37.9813284Z
Anomalous account lookups
An anomalous chain of attempts to look up user account information has been observed. An attacker might be gathering information about potential targets.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
ad0494b0-6cfa-4ba2-9285-706fd414acd8
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1033", "T1069.001", "T1069.002", "T1087", "T1087.001", "T1087.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "tmtower-book", "firstSeen": "2022-10-10T06:18:04.255Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Takeshi", "domainName": "TMTOWER-BOOK" } ], "mdatpDeviceId":...
[ { "aadUserId": null, "accountName": "Takeshi", "detectionStatus": null, "deviceId": null, "domainName": "TMTOWER-BOOK", "entityType": "User", "evidenceCreationTime": "2022-11-18T04:44:35.99Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTi...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:05:47.3Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,780
whoami /all
2022-11-21T02:02:27.1310359Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
da638045944567649219_-118043040
da638045944567649219_-118043040
765
MicrosoftDefenderForEndpoint
2022-11-21T02:27:36.7650424Z
2022-11-21T02:28:04.0766667Z
null
2022-11-21T02:05:26.6960915Z
2022-11-21T02:13:47.6774932Z
Enumeration of SMB sessions on a domain controller
A process is enumerating SMB sessions on a domain controller. An attacker might be looking for accessible shares or performing other reconnaissance activities in preparation for lateral movement to the domain controller.
Discovery
New
Medium
null
UnsupportedAlertType
null
null
MTP
53244628-2544-44ce-9109-0c9c36e47b35
null
null
null
[ "T1135", "T1087.001", "T1087.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "corp.local", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb353...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": null, "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:27:36.8066667Z", "fileName": "mimikatz.exe", "filePath": "", "ipAddress": null, "parentProcessCreatio...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:03:39.6566667Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
10,732
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
2022-11-21T02:01:38.0862456Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-12T02:12:32.7866667Z
Suspicious
None
jeff
prod.env
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-21T02:36:00.7266667Z
Suspicious
None
steve
prod.env
S-1-5-21-2300221942-1987151257-321556088-1107
0808dea1-2ec8-41d2-8e3e-7c18309fab09
steve@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T04:44:38.56Z
Suspicious
None
hacker
TMTOWER-BOOK
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
76866dde54ee3fa5bc8efefb9d44e6bf859973aa
afbe51517092256504f797f6a5abc02515a09d603e8c046ae31d7d7855568e91
net.exe
C:\Windows\System32
17,344
"net.exe" user /domain
2022-11-18T04:38:44.7323003Z
14,616
2022-11-14T04:36:16.5242809Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
83b06aa80899050e5d4132992e36b5b8f14b64e9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T17:03:43.1566667Z
Suspicious
None
svc_acct
null
S-1-12-1-2269820315-1261997569-3294602117-2733835123
874ab59b-8e01-4b38-85a3-5fc47303f3a2
msftadmin@msdx911571.onmicrosoft.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:10:33.65Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
7,696
"mimikatz.exe" privilege::debug sekurlsa::logonpasswords exit
2022-11-18T05:09:25.5414924Z
4,976
2022-11-18T05:04:12.7150402Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:22:11.6666667Z
Suspicious
None
ronhd
malicious.io
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:13:00.7233333Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-21T02:05:47.3Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
9,780
whoami /all
2022-11-21T02:02:27.1310359Z
11,068
2022-11-21T02:01:28.4753286Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T09:30:33.92Z
Suspicious
None
root
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
044ca0fecf2436aac3f9e7acc3c97b30588c594d
77b4c0f9929073ce132223f3169349f3e7a626c392b7dbc1a39fa89265c2c6bf
powershell_ise.exe
C:\Windows\System32\WindowsPowerShell\v1.0
5,408
"PowerShell_ISE.exe"
2022-12-22T09:07:41.4690585Z
2,980
2022-12-22T09:05:20.1978737Z
explorer.exe
C:\Windows
Detected
7ba8aa008687dd62d639cb45b52c7c9f971c65c1
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T09:30:44.15Z
Suspicious
None
jeff
staging.net
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-18T05:22:11.6666667Z
Suspicious
None
guest
null
S-1-5-18
null
null
cb9a0740d4e6270f032b289f41bf152a813bba9a
6cfff639a6c9d8a9fbc6d1df8c239e089a505ac8ae6aceed422bd3dd94be16dc
lsass.exe
688
lsass.exe
2022-11-10T17:17:06.0517668Z
576
2022-11-10T17:17:05.8533724Z
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-16T09:08:30.79Z
Suspicious
None
SYSTEM
staging.net
S-1-5-18
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:14:52.3Z
Suspicious
None
user1
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-11-11T08:18:37.01Z
Suspicious
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
70df765f554ed7392200422c18776b8992c09231
912018ab3c6b16b39ee84f17745ff0c80a33cee241013ec35d0281e40c0658d9
mimikatz.exe
C:\M365DAttack\Mimikatz\x64
6,044
copy con test.txt
2022-11-11T08:17:06.3382251Z
4,704
2022-11-11T08:16:44.2952776Z
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
Detected
c7e147cb0eb3534a4dcea5acb8e61c933713b145
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-20T12:55:53.1166667Z
Suspicious
None
steve
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
417911d0ed23fa27821fb50f094d994ed8fec8e4
34cb61ab7093580dd3ca4e4cbee00e1f55f8299f1e40b54a4a611f2a62566d79
msedge.exe
C:\Program Files (x86)\Microsoft\Edge\Application
10,512
ping 127.0.0.1
2022-12-20T12:52:33.7651136Z
9,792
2022-12-20T12:52:33.2640457Z
null
null
null
4f111b3b2366eacdcc66d7ad73548fff9b039c15
da638045930249254436_-241984083
6178cdf4-3eee-4a5d-bb91-6984adeefb2d
765
MicrosoftDefenderForEndpoint
2022-11-21T02:03:44.9254621Z
2022-11-21T02:47:46.7766667Z
null
2022-11-21T02:01:36.9984727Z
2022-11-21T02:33:54.0400057Z
Suspicious User Account Discovery
A known tool or technique was used to gather information on this device. Attackers might be trying to gather information about the target device or network for later attacks.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
9bfe28a9-21eb-4f8a-b51e-38ebd3650c88
null
null
null
[ "T1033", "T1087", "T1087.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb3534a4...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:03:45.04Z", "fileName": null, "filePath": null, "ipAddress": ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638095379371990747_-43346098
849fe427-119b-46cc-ac86-d6fd685e34a5
984
MicrosoftDefenderForEndpoint
2023-01-17T07:38:57.1990965Z
2023-01-17T07:44:35.38Z
null
2023-01-17T07:26:37.0136661Z
2023-01-17T07:26:37.0136661Z
'Locky' ransomware was prevented
Ransomware use common methods to encrypt files using keys that are known only to attackers. As a result, victims are unable to access the contents of the encrypted files. Most ransomware display or drop a ransom note—an image or an HTML file that contains information about how to obtain the attacker-supplied decryption tool for a fee.   To target documents or other files that contain user data, some ransomware look for files in certain locations and files with certain extension names. It is also common for ransomware to rename encrypted files so that they all use the same extension name.  This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Ransomware
New
Medium
64
PartiallyRemediated
null
null
WindowsDefenderAv
51d03c45-b142-4de4-95df-01b0c259d8f6
null
null
Locky
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "test.domain", "firstSeen": "2023-01-17T07:15:11.3017269Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5", "onboardingStatus": "Onboarded", "osBuild...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "7e5c8ca006a6a3ea72dbfbafdbcd8f5e14744ce5", "domainName": null, "entityType": "File", "evidenceCreationTime": "2023-01-17T07:38:57.4466667Z", "fileName": "TestFile_Block_Office_applications_from_cre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963592167272_591219755
a4dbf2a5-3be9-46c4-90ff-745a903bcea3
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:19.2167449Z
2022-12-22T08:59:20Z
null
2022-12-22T08:47:53.638129Z
2022-12-22T08:47:53.644205Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "test.domain", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [], "mdatpDeviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "onboardingStatus": "Onboarded", "osBuild":...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:19.2433333Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T04:50:03.6566667Z
Suspicious
None
Takeshi
corp.local
S-1-5-21-7316772-2057538409-3008203053-1001
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045930748018957_-1728305743
b2fe5df8-f486-41b4-93bf-ec47d13a1967
765
MicrosoftDefenderForEndpoint
2022-11-21T02:04:34.8019105Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:01:45.1526175Z
2022-11-21T02:05:52.8107598Z
Suspicious file registered as a service
A file with suspicious attributes or involved in possible breach activity was registered as a service. An attacker might be attempting to register the file as a service for persistence.
Persistence
Resolved
Medium
49
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAtp
d15c9f84-aabc-46e5-a92e-7bb3ce5eceda
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1021.002", "T1074.002", "T1543.003", "T1569.002", "T1570" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "lab.net", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "MSDXV2" } ], ...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-21T02:04:34.85Z", "fileName": null, "filePath": null, "ipAddress": null, ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072957101651357_-32911333
12b740ed-b42f-4377-bf9f-2c225ccf4c85
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:30.1651564Z
2022-12-22T09:03:31.15Z
null
2022-12-22T08:47:23.9095689Z
2022-12-22T08:47:56.5126978Z
Mimikatz credential theft tool
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
CredentialAccess
New
High
61
PendingApproval
null
null
WindowsDefenderAv
8cac979e-6dcc-44ad-8355-480eebaff1c1
null
null
Mimikatz
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpD...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "7ba8aa008687dd62d639cb45b52c7c9f971c65c1", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-12-22T08:48:30.1833333Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAtt...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072963843144030_-758810184
809a27bf-58fd-4bee-abf7-14c537a361d4
975
MicrosoftDefenderForEndpoint
2022-12-22T08:59:44.3144228Z
2022-12-22T09:02:46.7933333Z
null
2022-12-22T08:48:18.6176218Z
2022-12-22T08:48:18.6176218Z
Suspicious account creation
A new user account was created. A new user account can be created to establish a secondary of backup access to the device or services within the organization. An attacker might be attempting to maintain access to the device or organization.
Persistence
New
Medium
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
b0c31f72-1d80-458a-8ceb-5bc7bbcbd30a
null
null
null
[ "T1136", "T1136.001" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "staging.net", "firstSeen": "2022-12-08T01:05:46.8493187Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "3ad3fb0567038c2ec2e59e76690c2e6c01253af9", "onboardingStatus": "Onboarded", "os...
[ { "aadUserId": null, "accountName": "steve", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:59:44.34Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": nul...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-12-22T08:59:39.6033333Z
Suspicious
None
guest
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1107
null
steve@msdxv8.m365dpoc.com
6cbce4a295c163791b60fc23d285e6d84f28ee4c
de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c
powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0
7,052
powershell.exe -Command "Add-ADDBSidHistory -SamAccountName BDAdmin -SidHistory \"S-1-5-32-544\" -DatabasePath (Get-ItemProperty -Path Registry::HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Parameters).\"DSA Database file\""
2022-12-22T08:48:41.0981025Z
3,032
2022-12-22T08:48:18.0279285Z
cmd.exe
C:\Windows\System32
Detected
3ad3fb0567038c2ec2e59e76690c2e6c01253af9
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:12:05.72Z
Suspicious
None
bob
MSDXV2
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
dacfe313ad-33a5-499e-b640-8a03674418ad_1
cfe313ad-33a5-499e-b640-8a03674418ad_1
989
MicrosoftDefenderForEndpoint
2023-01-24T05:33:37.2373794Z
2023-01-24T05:45:53.9933333Z
null
2023-01-24T05:31:07.7317775Z
2023-01-24T05:43:53.4755031Z
Ransomware behavior detected in the file system
Suspicious file system changes might indicate ransomware activity. This potential ransomware activity might be indicative of mass encryption of files by ransomware.
Ransomware
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
1f1e3118-fa77-4fde-a750-9900c7a1dae3
null
null
null
[ "T1486" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Unknown", "deviceDnsName": "corp.local", "firstSeen": "2023-01-24T04:45:42.979Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "administrator1", "domainName": "DIYTESTMACHINE" } ], "mdatpDeviceId...
[ { "aadUserId": null, "accountName": "User1", "detectionStatus": null, "deviceId": null, "domainName": "DIYTESTMACHINE", "entityType": "User", "evidenceCreationTime": "2023-01-24T05:33:37.4166667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreat...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638043450424844453_1508847464
3c8e366d-e1d2-4279-8afa-696d70f2736c
741
MicrosoftDefenderForEndpoint
2022-11-18T05:10:42.4844653Z
2022-11-19T01:35:46.6533333Z
2022-11-19T01:35:46.5533333Z
2022-11-18T05:09:24.6257114Z
2022-11-18T05:10:02.6736516Z
Mimikatz credential theft tool
The Mimikatz hacktool was detected on this device. Mimikatz is a credential theft tool that can harvest plaintext passwords, password hashes, smartcard PINs, and Kerberos tickets. An attacker might be trying to harvest credentials to log into this or other devices on the network, by impersonating a valid user.
CredentialAccess
Resolved
High
47
PartiallyInvestigated
TruePositive
SecurityTesting
WindowsDefenderAv
8cac979e-6dcc-44ad-8355-480eebaff1c1
takeshi@msdxv2.m365dpoc.com
null
Mimikatz
[]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10v.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Detected", "deviceId": "c7e147cb0eb3534a4dcea5acb8e61c933713b145", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-18T05:10:42.51Z", "fileName": "mimikatz.exe", "filePath": "C:\\M365DAttack\\...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037516343950835_724143832
96627b9e-719f-4c99-a530-bfa50ad3d20a
686
MicrosoftDefenderForEndpoint
2022-11-11T08:20:34.3951054Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:16:44.6919693Z
2022-11-11T08:17:36.5981924Z
Suspicious sequence of exploration activities
A process called a set of windows commands. These commands can be used by attackers in order to identify assets of value and coordinate lateral movement after compromising a machine.
Discovery
Resolved
Low
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
acfdcbd1-cf72-47be-8e52-6cadc507656d
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1016", "T1018", "T1033", "T1049", "T1087", "T1087.001", "T1135" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "test.domain", "firstSeen": "2022-08-08T08:51:02.455Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV2" } ], "mdatpDeviceId": "c7e147cb0eb35...
[ { "aadUserId": "e848b07a-87af-4448-9979-09f0b809c8d4", "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "msdxv2.m365dpoc", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:20:34.4433333Z", "fileName": null, "filePath": null, "ipAddre...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-09-30T06:13:50.9266667Z
Benign
None
jeff
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1104
e848b07a-87af-4448-9979-09f0b809c8d4
jeff@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-22T08:50:36.4033333Z
Suspicious
None
alice
MSDXV8
S-1-5-21-2159906967-4174806019-1002223092-1104
null
jeff@msdxv8.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072957044277128_989984117
65c94f78-f644-4a3f-bf56-0c9ab9435dc9
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:24.4277321Z
2022-12-22T09:29:59.24Z
null
2022-12-22T08:47:23.9095689Z
2022-12-22T09:28:15.9884379Z
Malicious credential theft tool execution detected
A known credential theft tool execution command line was detected. Either the process itself or its command line indicated an intent to dump users' credentials, keys, plain-text passwords and more.
CredentialAccess
New
High
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
f5d3c5d8-ec3a-4412-ab45-934d8faff42c
null
null
null
[ "T1003" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "evilcorp.cn", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDeviceId": "7ba8aa008687d...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:24.7866667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
Process
2022-09-30T06:24:37.89Z
Suspicious
None
null
null
null
null
null
null
null
null
null
0
netstat -an
0001-01-01T00:00:00Z
0
0001-01-01T00:00:00Z
null
null
null
null
da638072957042777108_1449090152
6d180a49-04df-4357-ba1c-67979b1be5d8
975
MicrosoftDefenderForEndpoint
2022-12-22T08:48:24.2777282Z
2022-12-22T08:54:54.5066667Z
null
2022-12-22T08:47:22.2503604Z
2022-12-22T08:47:23.7158614Z
Multiple dual-purpose tools were dropped
Multiple known public tools, which could also be used for malicious reasons were dropped on this device. Attackers might download or copy multiple dual-purpose tools to the target device to perform various attack stages including, credential theft, privilege escalation, and lateral movement.
LateralMovement
New
High
61
PendingApproval
null
null
WindowsDefenderAtp
e0e0ea40-b5ca-4cbf-8380-24119951f847
null
null
null
[ "T1003", "T1021", "T1105", "T1555", "T1558.003", "T1570" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpDev...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:48:24.58Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime": null...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045935122751549_-904383286
0076e844-aa6c-422f-88ff-f975e13699a7
765
MicrosoftDefenderForEndpoint
2022-11-21T02:11:52.2751697Z
2022-11-21T02:36:07.96Z
null
2022-11-21T02:07:15.3883516Z
2022-11-21T02:34:15.2385142Z
Suspicious service launched
A suspicious service was started on this device. Attackers might use services to launch malicious commands or programs. This technique is used to maintain persistence or elevate privileges on the target device.
Execution
New
Medium
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
a5af9713-6eea-4d23-9bdc-9cab19f19092
null
null
null
[ "T1569.002" ]
[ { "aadDeviceId": null, "defenderAvStatus": "NotSupported", "deviceDnsName": "rnd.local", "firstSeen": "2022-08-08T08:27:58.906Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "Defender", "domainName": "MSDXV2" } ], "mdatpDeviceId": "e138ec...
[ { "aadUserId": null, "accountName": "SYSTEM", "detectionStatus": "Detected", "deviceId": "e138ecd8e7b21eaf952cb35d56349bf50c64ac96", "domainName": "NT AUTHORITY", "entityType": "Process", "evidenceCreationTime": "2022-11-21T02:11:52.32Z", "fileName": "PSEXESVC.exe", "filePath": "...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-12-13T20:37:53.13Z
Benign
None
darol
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1110
598763ac-48bb-4671-9472-6be219756e33
darol@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
User
2022-11-18T05:22:11.45Z
Suspicious
None
admin
msdxv2.m365dpoc
S-1-5-21-2300221942-1987151257-321556088-1111
89b6fc86-af84-47b2-a72d-325362598b2c
ronhd@msdxv2.m365dpoc.com
null
null
null
null
null
null
null
null
null
null
null
null
null
da638045935981936949_-814125345
1c163e80-5ce7-48cd-b956-51bf761fd951
765
MicrosoftDefenderForEndpoint
2022-11-21T02:13:18.1937163Z
2022-11-26T01:35:43.17Z
2022-11-26T01:35:43.0633333Z
2022-11-21T02:01:54.5564455Z
2022-11-22T23:54:01.053016Z
'Kekeo' malware was prevented
Malware and unwanted software are undesirable applications that perform annoying, disruptive, or harmful actions on affected machines. Some of these undesirable applications can replicate and spread from one machine to another. Others are able to receive commands from remote attackers and perform activities associated with cyber attacks. This detection might indicate that the malware was stopped from delivering its payload. However, it is prudent to check the machine for signs of infection.
Malware
Resolved
Informational
49
TerminatedBySystem
TruePositive
SecurityTesting
WindowsDefenderAv
d60f5b90-ecd8-4d77-8186-a801597ec762
takeshi@msdxv2.m365dpoc.com
null
Kekeo
[]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [ { "accountName": "steve", "domainName": "M...
[ { "aadUserId": null, "accountName": null, "detectionStatus": "Prevented", "deviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48", "domainName": null, "entityType": "File", "evidenceCreationTime": "2022-11-21T02:13:18.2766667Z", "fileName": "Rubeus.exe", "filePath": "C:\\Temp", ...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638072958472701689_-563268025
9889b340-9a4a-43d9-8023-6c7f714f5e6a
975
MicrosoftDefenderForEndpoint
2022-12-22T08:50:47.270188Z
2022-12-22T09:03:14.7633333Z
null
2022-12-22T08:28:11.2789495Z
2022-12-22T08:47:53.8002928Z
Suspicious sequence of exploration activities
A process called a set of windows commands. These commands can be used by attackers in order to identify assets of value and coordinate lateral movement after compromising a machine.
Discovery
New
Low
null
UnsupportedAlertType
null
null
WindowsDefenderAtp
acfdcbd1-cf72-47be-8e52-6cadc507656d
null
null
null
[ "T1016", "T1018", "T1049", "T1069.001", "T1069.002", "T1087", "T1087.001", "T1135" ]
[ { "aadDeviceId": null, "defenderAvStatus": "Updated", "deviceDnsName": "msdxv8-win10v.msdxv8.m365dpoc.com", "firstSeen": "2022-12-08T05:21:19.944Z", "healthStatus": "Inactive", "loggedOnUsers": [ { "accountName": "jeff", "domainName": "MSDXV8" } ], "mdatpD...
[ { "aadUserId": null, "accountName": "jeff", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV8", "entityType": "User", "evidenceCreationTime": "2022-12-22T08:50:47.2866667Z", "fileName": null, "filePath": null, "ipAddress": null, "parentProcessCreationTime":...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
da638037515597874766_-635422680
0c8742c0-7d22-40b4-ba23-8fa4283342e0
686
MicrosoftDefenderForEndpoint
2022-11-11T08:19:19.787503Z
2022-11-12T01:35:43.1766667Z
2022-11-12T01:35:42.84Z
2022-11-11T08:17:34.7790325Z
2022-11-11T08:17:35.2838941Z
Possible use of the Rubeus kerberoasting tool
Activity indicating the use of the Rubeus tool was observed on this endpoint. This tool can perform kerberoasting, pass-the-ticket, and other attack techniques that take advantage of Kerberos authentication. During these attacks, attackers often request Kerberos tickets for an account's service principal name (SPN). They then decrypt the tickets to get plaintext credentials associated with the account. Alternatively, they can perform the pass-the-ticket technique to authenticate directly without having to decrypt the obtained tickets.
SuspiciousActivity
Resolved
Medium
null
UnsupportedAlertType
TruePositive
SecurityTesting
WindowsDefenderAtp
6606ef29-d293-4f24-a7c5-334dcb40b412
takeshi@msdxv2.m365dpoc.com
null
null
[ "T1558.003" ]
[ { "aadDeviceId": "14b11ffe-5128-4842-bbdf-31f0fbfcb600", "defenderAvStatus": "Updated", "deviceDnsName": "msdxv2-win10b.msdxv2.m365dpoc.com", "firstSeen": "2022-08-08T08:29:47.252Z", "healthStatus": "Active", "loggedOnUsers": [], "mdatpDeviceId": "36150b3c1b69b5c2da9df4efd86ac6c166924a48...
[ { "aadUserId": "89b6fc86-af84-47b2-a72d-325362598b2c", "accountName": "ronhd", "detectionStatus": null, "deviceId": null, "domainName": "MSDXV2", "entityType": "User", "evidenceCreationTime": "2022-11-11T08:19:19.8366667Z", "fileName": null, "filePath": null, "ipAddress": nul...
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null
null