input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Sep 29 01:52:19 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=197.59.246.103 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=10.84.211.66 dst=197.59.246.103 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1670 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=149 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
Product: Trend Deep Security Vendor: Trend Micro
Identify this syslog message
<134>Sep 29 01:52:19 deepsecurity CEF:0|Trend Micro|Deep Security Agent|50.0.1432|1003305|Detected HTTP Traffic Over Secured HTTPS Channels|8|cn1=36465 cn1Label=Host ID dvc=197.59.246.103 TrendMicroDsTenant=PayGoElectric TrendMicroDsTenantId=24873 dmac=0A:BB:AE:EE:7A:E1 smac=0A:37:7C:7D:F5:29 TrendMicroDsFrameType=IP src=10.84.211.66 dst=197.59.246.103 in=0 cs3=DF 0 cs3Label=Fragmentation Bits proto=TCP spt=1670 dpt=443 cs2=ACK PSH cs2Label=TCP Flags cnt=149 act=IDS:Reset cn3=0 cn3Label=DPI Packet Position cs5=0 cs5Label=DPI Stream Position cs1="HTTPTraffic" cs1Label=DPI Note cs6=0 cs6Label=DPI Flags
This is a syslog message from a product called Trend Deep Security by Trend Micro. The following fields were extracted from the message: senderhost: 34.205.5.2 serverport: 443 severitylabel: critical tags: ['TCP Flags:ACK PSH', 'trend micro_deep security agent_Detected HTTP Traffic Over Secured HTTPS Channels', 'DPI Note:HTTPTraffic', 'Detected HTTP Traffic Over Secured HTTPS Channels', 'rfc3164', 'Fragmentation Bits:DF 0', 'cef', 'DPI Flags:0', 'trend micro_deep security agent', 'DPI Stream Position :0'] productids: [30] severitycode: 2 sourceinfo: unknown localstarttime: Sep 29 01:52:19 sensitivity: normal localhostname: deepsecurity priority: 134 facilitylabel: local0 messagetype: Detected HTTP Traffic Over Secured HTTPS Channels servermac: 0ABBAEEE7AE1 clientmac: 0A377C7DF529 clientport: 1670 vendorcode: 1003305 action: IDS:Reset protocol: 6 facilitycode: 16 streamName: trend micro_deep security agent clientIP: 10.84.211.66 serverIP: 197.59.246.103
Explain this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699129537|access denied|239.54.150.73|https://shareholders.stark.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 4 20:25:37", "message": "<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699129537|access denied|239.54.150.73|https://shareholders.stark.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699129537", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "239.54.150.73" }
Create a JSON artifact from the message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699129537|access denied|239.54.150.73|https://shareholders.stark.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699129537|access denied|239.54.150.73|https://shareholders.stark.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 4 20:25:37 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699129537 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 239.54.150.73
Explain this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|158.132.116.110|https://shareholders.wayne.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 4 20:25:37", "message": "<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|158.132.116.110|https://shareholders.wayne.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699129537", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "158.132.116.110" }
Create a JSON artifact from the message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|158.132.116.110|https://shareholders.wayne.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|158.132.116.110|https://shareholders.wayne.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 4 20:25:37 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699129537 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 158.132.116.110
Explain this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|99.249.118.63|https://shareholders.oscorp.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 4 20:25:37", "message": "<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|99.249.118.63|https://shareholders.oscorp.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699129537", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "99.249.118.63" }
Create a JSON artifact from the message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|99.249.118.63|https://shareholders.oscorp.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|99.249.118.63|https://shareholders.oscorp.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 4 20:25:37 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699129537 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 99.249.118.63
Explain this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|103.124.113.244|https://shareholders.wayne.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 4 20:25:37", "message": "<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|103.124.113.244|https://shareholders.wayne.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699129537", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "103.124.113.244" }
Create a JSON artifact from the message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|103.124.113.244|https://shareholders.wayne.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|103.124.113.244|https://shareholders.wayne.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 4 20:25:37 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699129537 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 103.124.113.244
Explain this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699129537|access denied|94.7.187.144|https://shareholders.stark.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 4 20:25:37", "message": "<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699129537|access denied|94.7.187.144|https://shareholders.stark.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699129537", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "94.7.187.144" }
Create a JSON artifact from the message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699129537|access denied|94.7.187.144|https://shareholders.stark.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.stark.com|1699129537|access denied|94.7.187.144|https://shareholders.stark.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 4 20:25:37 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699129537 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 94.7.187.144
Explain this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|84.128.164.41|https://shareholders.oscorp.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 4 20:25:37", "message": "<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|84.128.164.41|https://shareholders.oscorp.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699129537", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "84.128.164.41" }
Create a JSON artifact from the message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|84.128.164.41|https://shareholders.oscorp.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|84.128.164.41|https://shareholders.oscorp.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 4 20:25:37 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699129537 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 84.128.164.41
Explain this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|253.187.92.174|https://shareholders.oscorp.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 4 20:25:37", "message": "<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|253.187.92.174|https://shareholders.oscorp.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699129537", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "253.187.92.174" }
Create a JSON artifact from the message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|253.187.92.174|https://shareholders.oscorp.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|253.187.92.174|https://shareholders.oscorp.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 4 20:25:37 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699129537 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 253.187.92.174
Explain this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|218.245.46.254|https://shareholders.oscorp.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 4 20:25:37", "message": "<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|218.245.46.254|https://shareholders.oscorp.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699129537", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "218.245.46.254" }
Create a JSON artifact from the message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|218.245.46.254|https://shareholders.oscorp.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|218.245.46.254|https://shareholders.oscorp.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 4 20:25:37 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699129537 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 218.245.46.254
Explain this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|24.88.251.30|https://shareholders.oscorp.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 4 20:25:37", "message": "<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|24.88.251.30|https://shareholders.oscorp.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699129537", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "24.88.251.30" }
Create a JSON artifact from the message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|24.88.251.30|https://shareholders.oscorp.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.oscorp.com|1699129537|access denied|24.88.251.30|https://shareholders.oscorp.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 4 20:25:37 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699129537 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 24.88.251.30
Explain this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|83.246.194.204|https://shareholders.wayne.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "ip-10-1-16-76", "localstarttime": "Nov 4 20:25:37", "message": "<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|83.246.194.204|https://shareholders.wayne.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1699129537", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "83.246.194.204" }
Create a JSON artifact from the message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|83.246.194.204|https://shareholders.wayne.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Nov 4 20:25:37 ip-10-1-16-76 drupal: https://shareholders.wayne.com|1699129537|access denied|83.246.194.204|https://shareholders.wayne.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: ip-10-1-16-76 localstarttime: Nov 4 20:25:37 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1699129537 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 83.246.194.204
Explain this syslog message
WitFoo-Artifact ::: fqdn=publimovil.com.py ::: action=BLOCKED ::: message={"originId":410612148,"originType":"AD Users","internalIp":"166.251.180.213","externalIp":"200.51.91.249","categories":["Malware","Phishing"],"tags":[],"destination":"publimovil.com.py","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T15:28:56.000Z"} ::: clientIP=166.251.180.213 ::: serverIP=200.51.91.249 ::: userName=bob ::: created_at=2022-11-03T15:28:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T15:28:56.000Z ::: serverHostname=publimovil.com.py ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-11-03T15:28:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=publimovil.com.py ::: action=BLOCKED ::: message={\"originId\":410612148,\"originType\":\"AD Users\",\"internalIp\":\"166.251.180.213\",\"externalIp\":\"200.51.91.249\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"publimovil.com.py\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T15:28:56.000Z\"} ::: clientIP=166.251.180.213 ::: serverIP=200.51.91.249 ::: userName=bob ::: created_at=2022-11-03T15:28:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T15:28:56.000Z ::: serverHostname=publimovil.com.py ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "publimovil.com.py", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "publimovil.com.py", "vendorcode": "MalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "166.251.180.213", "serverIP": "200.51.91.249", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=publimovil.com.py ::: action=BLOCKED ::: message={"originId":410612148,"originType":"AD Users","internalIp":"166.251.180.213","externalIp":"200.51.91.249","categories":["Malware","Phishing"],"tags":[],"destination":"publimovil.com.py","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T15:28:56.000Z"} ::: clientIP=166.251.180.213 ::: serverIP=200.51.91.249 ::: userName=bob ::: created_at=2022-11-03T15:28:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T15:28:56.000Z ::: serverHostname=publimovil.com.py ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=publimovil.com.py ::: action=BLOCKED ::: message={"originId":410612148,"originType":"AD Users","internalIp":"166.251.180.213","externalIp":"200.51.91.249","categories":["Malware","Phishing"],"tags":[],"destination":"publimovil.com.py","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-11-03T15:28:56.000Z"} ::: clientIP=166.251.180.213 ::: serverIP=200.51.91.249 ::: userName=bob ::: created_at=2022-11-03T15:28:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T15:28:56.000Z ::: serverHostname=publimovil.com.py ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-11-03T15:28:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: publimovil.com.py messagetype: firewall_action severitycode: 2 fqdn: publimovil.com.py vendorcode: MalwarePhishing action: block streamName: OpenDNS Detection clientIP: 166.251.180.213 serverIP: 200.51.91.249 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=publimovil.com.py ::: action=BLOCKED ::: message={"originId":410612148,"originType":"AD Users","internalIp":"204.145.124.171","externalIp":"227.193.61.110","categories":["Malware","Phishing"],"tags":[],"destination":"publimovil.com.py","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T15:28:56.000Z"} ::: clientIP=204.145.124.171 ::: serverIP=227.193.61.110 ::: userName=fish ::: created_at=2022-11-03T15:28:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T15:28:56.000Z ::: serverHostname=publimovil.com.py ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-11-03T15:28:56.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=publimovil.com.py ::: action=BLOCKED ::: message={\"originId\":410612148,\"originType\":\"AD Users\",\"internalIp\":\"204.145.124.171\",\"externalIp\":\"227.193.61.110\",\"categories\":[\"Malware\",\"Phishing\"],\"tags\":[],\"destination\":\"publimovil.com.py\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-11-03T15:28:56.000Z\"} ::: clientIP=204.145.124.171 ::: serverIP=227.193.61.110 ::: userName=fish ::: created_at=2022-11-03T15:28:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T15:28:56.000Z ::: serverHostname=publimovil.com.py ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "publimovil.com.py", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "publimovil.com.py", "vendorcode": "MalwarePhishing", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "204.145.124.171", "serverIP": "227.193.61.110", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=publimovil.com.py ::: action=BLOCKED ::: message={"originId":410612148,"originType":"AD Users","internalIp":"204.145.124.171","externalIp":"227.193.61.110","categories":["Malware","Phishing"],"tags":[],"destination":"publimovil.com.py","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T15:28:56.000Z"} ::: clientIP=204.145.124.171 ::: serverIP=227.193.61.110 ::: userName=fish ::: created_at=2022-11-03T15:28:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T15:28:56.000Z ::: serverHostname=publimovil.com.py ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=publimovil.com.py ::: action=BLOCKED ::: message={"originId":410612148,"originType":"AD Users","internalIp":"204.145.124.171","externalIp":"227.193.61.110","categories":["Malware","Phishing"],"tags":[],"destination":"publimovil.com.py","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-11-03T15:28:56.000Z"} ::: clientIP=204.145.124.171 ::: serverIP=227.193.61.110 ::: userName=fish ::: created_at=2022-11-03T15:28:56.000Z ::: streamName=OpenDNS Detection ::: vendorCode=MalwarePhishing ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-11-03T15:28:56.000Z ::: serverHostname=publimovil.com.py ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-11-03T15:28:56.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: publimovil.com.py messagetype: firewall_action severitycode: 2 fqdn: publimovil.com.py vendorcode: MalwarePhishing action: block streamName: OpenDNS Detection clientIP: 204.145.124.171 serverIP: 227.193.61.110 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"220.185.72.234","externalIp":"189.47.215.23","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=220.185.72.234 ::: serverIP=189.47.215.23 ::: userName=fish ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:38:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"220.185.72.234\",\"externalIp\":\"189.47.215.23\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"fbc-statesboro.org\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:51.000Z\"} ::: clientIP=220.185.72.234 ::: serverIP=189.47.215.23 ::: userName=fish ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "220.185.72.234", "serverIP": "189.47.215.23", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"220.185.72.234","externalIp":"189.47.215.23","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=220.185.72.234 ::: serverIP=189.47.215.23 ::: userName=fish ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"220.185.72.234","externalIp":"189.47.215.23","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=220.185.72.234 ::: serverIP=189.47.215.23 ::: userName=fish ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:38:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 220.185.72.234 serverIP: 189.47.215.23 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"215.165.202.79","externalIp":"28.127.3.104","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=215.165.202.79 ::: serverIP=28.127.3.104 ::: userName=janedoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:38:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"215.165.202.79\",\"externalIp\":\"28.127.3.104\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"fbc-statesboro.org\",\"originLabel\":\"janedoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:51.000Z\"} ::: clientIP=215.165.202.79 ::: serverIP=28.127.3.104 ::: userName=janedoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "215.165.202.79", "serverIP": "28.127.3.104", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"215.165.202.79","externalIp":"28.127.3.104","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=215.165.202.79 ::: serverIP=28.127.3.104 ::: userName=janedoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"215.165.202.79","externalIp":"28.127.3.104","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"janedoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=215.165.202.79 ::: serverIP=28.127.3.104 ::: userName=janedoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:38:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 215.165.202.79 serverIP: 28.127.3.104 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"127.216.177.200","externalIp":"11.241.176.58","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=127.216.177.200 ::: serverIP=11.241.176.58 ::: userName=charlie ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:38:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"127.216.177.200\",\"externalIp\":\"11.241.176.58\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"fbc-statesboro.org\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:51.000Z\"} ::: clientIP=127.216.177.200 ::: serverIP=11.241.176.58 ::: userName=charlie ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "127.216.177.200", "serverIP": "11.241.176.58", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"127.216.177.200","externalIp":"11.241.176.58","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=127.216.177.200 ::: serverIP=11.241.176.58 ::: userName=charlie ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"127.216.177.200","externalIp":"11.241.176.58","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=127.216.177.200 ::: serverIP=11.241.176.58 ::: userName=charlie ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:38:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 127.216.177.200 serverIP: 11.241.176.58 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"72.156.167.82","externalIp":"49.28.156.170","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=72.156.167.82 ::: serverIP=49.28.156.170 ::: userName=johndoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:38:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"72.156.167.82\",\"externalIp\":\"49.28.156.170\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"fbc-statesboro.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:51.000Z\"} ::: clientIP=72.156.167.82 ::: serverIP=49.28.156.170 ::: userName=johndoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "72.156.167.82", "serverIP": "49.28.156.170", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"72.156.167.82","externalIp":"49.28.156.170","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=72.156.167.82 ::: serverIP=49.28.156.170 ::: userName=johndoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"72.156.167.82","externalIp":"49.28.156.170","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=72.156.167.82 ::: serverIP=49.28.156.170 ::: userName=johndoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:38:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 72.156.167.82 serverIP: 49.28.156.170 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"91.225.30.110","externalIp":"226.124.19.64","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=91.225.30.110 ::: serverIP=226.124.19.64 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:38:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"91.225.30.110\",\"externalIp\":\"226.124.19.64\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"fbc-statesboro.org\",\"originLabel\":\"nighthawk\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:51.000Z\"} ::: clientIP=91.225.30.110 ::: serverIP=226.124.19.64 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "91.225.30.110", "serverIP": "226.124.19.64", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"91.225.30.110","externalIp":"226.124.19.64","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=91.225.30.110 ::: serverIP=226.124.19.64 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"91.225.30.110","externalIp":"226.124.19.64","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"nighthawk","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=91.225.30.110 ::: serverIP=226.124.19.64 ::: userName=nighthawk ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:38:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 91.225.30.110 serverIP: 226.124.19.64 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"108.235.159.87","externalIp":"115.123.136.7","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=108.235.159.87 ::: serverIP=115.123.136.7 ::: userName=johndoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "2022-05-26T15:38:51.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "productids": [ 38, 0 ], "sourceinfo": "unknown", "message": "WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={\"originId\":410614338,\"originType\":\"AD Users\",\"internalIp\":\"108.235.159.87\",\"externalIp\":\"115.123.136.7\",\"categories\":[\"Religious\",\"Phishing\",\"Religion\"],\"tags\":[],\"destination\":\"fbc-statesboro.org\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-05-26T15:38:51.000Z\"} ::: clientIP=108.235.159.87 ::: serverIP=115.123.136.7 ::: userName=johndoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch", "sensitivity": "normal", "serverhostname": "fbc-statesboro.org", "messagetype": "firewall_action", "severitycode": 2, "fqdn": "fbc-statesboro.org", "vendorcode": "ReligiousPhishingReligion", "action": "block", "streamName": "OpenDNS Detection", "clientIP": "108.235.159.87", "serverIP": "115.123.136.7", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"108.235.159.87","externalIp":"115.123.136.7","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=108.235.159.87 ::: serverIP=115.123.136.7 ::: userName=johndoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=fbc-statesboro.org ::: action=BLOCKED ::: message={"originId":410614338,"originType":"AD Users","internalIp":"108.235.159.87","externalIp":"115.123.136.7","categories":["Religious","Phishing","Religion"],"tags":[],"destination":"fbc-statesboro.org","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-05-26T15:38:51.000Z"} ::: clientIP=108.235.159.87 ::: serverIP=115.123.136.7 ::: userName=johndoe ::: created_at=2022-05-26T15:38:51.000Z ::: streamName=OpenDNS Detection ::: vendorCode=ReligiousPhishingReligion ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-05-26T15:38:51.000Z ::: serverHostname=fbc-statesboro.org ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 2022-05-26T15:38:51.000Z tags: ['OpenDNS Detection', 'firewall_action'] productids: [38, 0] sourceinfo: unknown sensitivity: normal serverhostname: fbc-statesboro.org messagetype: firewall_action severitycode: 2 fqdn: fbc-statesboro.org vendorcode: ReligiousPhishingReligion action: block streamName: OpenDNS Detection clientIP: 108.235.159.87 serverIP: 115.123.136.7 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"82.40.60.75","externalIp":"185.129.186.209","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=82.40.60.75 ::: serverIP=185.129.186.209 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"82.40.60.75\",\"externalIp\":\"185.129.186.209\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"bob\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=82.40.60.75 ::: serverIP=185.129.186.209 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "82.40.60.75", "serverIP": "185.129.186.209", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"82.40.60.75","externalIp":"185.129.186.209","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=82.40.60.75 ::: serverIP=185.129.186.209 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"82.40.60.75","externalIp":"185.129.186.209","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"bob","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=82.40.60.75 ::: serverIP=185.129.186.209 ::: userName=bob ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 82.40.60.75 serverIP: 185.129.186.209 userName: bob
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"218.163.84.29","externalIp":"56.212.2.105","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=218.163.84.29 ::: serverIP=56.212.2.105 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"218.163.84.29\",\"externalIp\":\"56.212.2.105\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=218.163.84.29 ::: serverIP=56.212.2.105 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "218.163.84.29", "serverIP": "56.212.2.105", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"218.163.84.29","externalIp":"56.212.2.105","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=218.163.84.29 ::: serverIP=56.212.2.105 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"218.163.84.29","externalIp":"56.212.2.105","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=218.163.84.29 ::: serverIP=56.212.2.105 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 218.163.84.29 serverIP: 56.212.2.105 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.129.65.227","externalIp":"57.80.26.232","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.129.65.227 ::: serverIP=57.80.26.232 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"88.129.65.227\",\"externalIp\":\"57.80.26.232\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"fish\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=88.129.65.227 ::: serverIP=57.80.26.232 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "88.129.65.227", "serverIP": "57.80.26.232", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.129.65.227","externalIp":"57.80.26.232","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.129.65.227 ::: serverIP=57.80.26.232 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"88.129.65.227","externalIp":"57.80.26.232","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"fish","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=88.129.65.227 ::: serverIP=57.80.26.232 ::: userName=fish ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 88.129.65.227 serverIP: 57.80.26.232 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"157.43.168.136","externalIp":"157.131.152.240","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=157.43.168.136 ::: serverIP=157.131.152.240 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"157.43.168.136\",\"externalIp\":\"157.131.152.240\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"johndoe\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=157.43.168.136 ::: serverIP=157.131.152.240 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "157.43.168.136", "serverIP": "157.131.152.240", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"157.43.168.136","externalIp":"157.131.152.240","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=157.43.168.136 ::: serverIP=157.131.152.240 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"157.43.168.136","externalIp":"157.131.152.240","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"johndoe","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=157.43.168.136 ::: serverIP=157.131.152.240 ::: userName=johndoe ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 157.43.168.136 serverIP: 157.131.152.240 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"10.238.97.42","externalIp":"201.180.125.5","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=10.238.97.42 ::: serverIP=201.180.125.5 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"10.238.97.42\",\"externalIp\":\"201.180.125.5\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"alice\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=10.238.97.42 ::: serverIP=201.180.125.5 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "10.238.97.42", "serverIP": "201.180.125.5", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"10.238.97.42","externalIp":"201.180.125.5","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=10.238.97.42 ::: serverIP=201.180.125.5 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"10.238.97.42","externalIp":"201.180.125.5","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"alice","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=10.238.97.42 ::: serverIP=201.180.125.5 ::: userName=alice ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 10.238.97.42 serverIP: 201.180.125.5 userName: alice
Explain this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"16.104.105.122","externalIp":"167.66.135.139","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=16.104.105.122 ::: serverIP=167.66.135.139 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
{ "action": "block", "fqdn": "clicksapp.net", "message": "WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={\"originId\":520155829,\"originType\":\"Roaming Computers\",\"internalIp\":\"16.104.105.122\",\"externalIp\":\"167.66.135.139\",\"categories\":[\"Advertisements\",\"Potentially Harmful\"],\"tags\":[],\"destination\":\"clicksapp.net\",\"originLabel\":\"charlie\",\"actionTaken\":\"BLOCKED\",\"datetime\":\"2022-10-23T15:56:12.000Z\"} ::: clientIP=16.104.105.122 ::: serverIP=167.66.135.139 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch", "messagetype": "firewall_action", "productids": [ 38 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "serverhostname": "clicksapp.net", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2022-10-23T15:56:12.000Z", "tags": [ "OpenDNS Detection", "firewall_action" ], "vendorcode": "AdvertisementsPotentially Harmful", "streamName": "OpenDNS Detection", "clientIP": "16.104.105.122", "serverIP": "167.66.135.139", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"16.104.105.122","externalIp":"167.66.135.139","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=16.104.105.122 ::: serverIP=167.66.135.139 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
Product: Umbrella Vendor: Cisco
Identify this syslog message
WitFoo-Artifact ::: fqdn=clicksapp.net ::: action=BLOCKED ::: message={"originId":520155829,"originType":"Roaming Computers","internalIp":"16.104.105.122","externalIp":"167.66.135.139","categories":["Advertisements","Potentially Harmful"],"tags":[],"destination":"clicksapp.net","originLabel":"charlie","actionTaken":"BLOCKED","datetime":"2022-10-23T15:56:12.000Z"} ::: clientIP=16.104.105.122 ::: serverIP=167.66.135.139 ::: userName=charlie ::: created_at=2022-10-23T15:56:12.000Z ::: streamName=OpenDNS Detection ::: vendorCode=AdvertisementsPotentially Harmful ::: messageType=firewall_action ::: pipelineName=OpenDNS Detection ::: severityCode=2 ::: startTimeUTC=2022-10-23T15:56:12.000Z ::: serverHostname=clicksapp.net ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Umbrella by Cisco. The following fields were extracted from the message: action: block fqdn: clicksapp.net messagetype: firewall_action productids: [38] senderhost: kafka.precinct sensitivity: normal serverhostname: clicksapp.net severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2022-10-23T15:56:12.000Z tags: ['OpenDNS Detection', 'firewall_action'] vendorcode: AdvertisementsPotentially Harmful streamName: OpenDNS Detection clientIP: 16.104.105.122 serverIP: 167.66.135.139 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: userName=fish ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"56.243.110.206","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=56.243.110.206 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0", "filename": "dllhost.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe", "message": "WitFoo-Artifact ::: userName=fish ::: fileName=dllhost.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:12Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"fish\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:26.823543454Z\",\"date_updated\":\"2024-07-19T12:56:48Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@oscorpelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"56.243.110.206\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:12Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:12Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=56.243.110.206 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "56.243.110.206", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: userName=fish ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"56.243.110.206","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=56.243.110.206 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: userName=fish ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"56.243.110.206","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=56.243.110.206 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 filename: dllhost.exe filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 56.243.110.206 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fileName=explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"214.203.72.39","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=fish ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: clientIP=214.203.72.39
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054", "filename": "explorer.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe", "message": "WitFoo-Artifact ::: fileName=explorer.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"fish\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"fish\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@starkelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"214.203.72.39\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=fish ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: clientIP=214.203.72.39", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "214.203.72.39", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fileName=explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"214.203.72.39","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=fish ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: clientIP=214.203.72.39
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: fileName=explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"214.203.72.39","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=fish ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: clientIP=214.203.72.39
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 filename: explorer.exe filepath: \Device\HarddiskVolume3\Windows\explorer.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 214.203.72.39 userName: fish
Explain this syslog message
WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"150.244.70.114","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientIP=150.244.70.114 ::: userName=alice ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60", "filename": "pwsh.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe", "message": "WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@umbrellaelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"150.244.70.114\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: streamName=Crowdstrike Detection ::: clientIP=150.244.70.114 ::: userName=alice ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "150.244.70.114", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"150.244.70.114","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientIP=150.244.70.114 ::: userName=alice ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"150.244.70.114","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientIP=150.244.70.114 ::: userName=alice ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 filename: pwsh.exe filepath: \Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 150.244.70.114 userName: alice
Explain this syslog message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cacmee\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attacmeed=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"bob","last_seen":"2024-05-10T15:27:29Z","local_ip":"59.194.111.119","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=59.194.111.119 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=bob ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-ff-c8-e9-2f-db", "filehash": "978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b", "filename": "triPOS Setup.exe", "filepath": "\\Device\\HarddiskVolume3\\ProgramData\\Package Cache\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe", "message": "WitFoo-Artifact ::: filePath=\\Device\\HarddiskVolume3\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"458\",\"cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Cacmee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776\",\"confidence\":60,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"filename\":\"triPOS Setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\ProgramData\\\\Package Cacmee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"6468e92d1ad408df05df38c1192de790\",\"objective\":\"Follow Through\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Cacmee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.clean.room=\\\"C:\\\\ProgramData\\\\Package Cacmee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.filehandle.attacmeed=536 -burn.filehandle.self=544 /uninstall\",\"parent_md5\":\"6468e92d1ad408df05df38c1192de790\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295\",\"parent_sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":true,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"ransomware\",\"severity\":50,\"sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"timestamp\":\"2024-05-10T15:46:45Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"bob\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-05-10T15:46:52.112770748Z\",\"date_updated\":\"2024-05-10T15:46:56Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-05-08T23:47:06.818Z\",\"agent_version\":\"7.13.18308.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18308\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"75.231.140.51\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-05-09T03:50:36Z\",\"last_login_user\":\"bob\",\"last_seen\":\"2024-05-10T15:27:29Z\",\"local_ip\":\"59.194.111.119\",\"mac_address\":\"00-ff-c8-e9-2f-db\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-05-10T15:29:07Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-05-10T15:46:45Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-05-10T15:46:45Z\",\"max_confidence\":60,\"max_severity\":50,\"max_severity_displayname\":\"Medium\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=59.194.111.119 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=bob ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "59.194.111.119", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cacmee\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attacmeed=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"bob","last_seen":"2024-05-10T15:27:29Z","local_ip":"59.194.111.119","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=59.194.111.119 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=bob ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cacmee\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cacmee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attacmeed=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"bob","last_seen":"2024-05-10T15:27:29Z","local_ip":"59.194.111.119","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=59.194.111.119 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=bob ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-ff-c8-e9-2f-db filehash: 978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b filename: triPOS Setup.exe filepath: \Device\HarddiskVolume3\ProgramData\Package Cache\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 59.194.111.119 userName: bob
Explain this syslog message
WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=222.131.154.126 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: userName=alice ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"222.131.154.126","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=dllhost.exe
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0", "filename": "dllhost.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe", "message": "WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=222.131.154.126 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: userName=alice ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:26Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:33.847795046Z\",\"date_updated\":\"2024-07-19T12:56:40Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@acmeelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"222.131.154.126\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:26Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:26Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileName=dllhost.exe", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "222.131.154.126", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=222.131.154.126 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: userName=alice ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"222.131.154.126","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=dllhost.exe
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=222.131.154.126 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: userName=alice ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"222.131.154.126","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=dllhost.exe
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 filename: dllhost.exe filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 222.131.154.126 userName: alice
Explain this syslog message
WitFoo-Artifact ::: userName=nighthawk ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"201.213.150.88","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=201.213.150.88 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0", "filename": "dllhost.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe", "message": "WitFoo-Artifact ::: userName=nighthawk ::: fileName=dllhost.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:12Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"nighthawk\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:26.823543454Z\",\"date_updated\":\"2024-07-19T12:56:48Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@starkelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"201.213.150.88\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:12Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:12Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=201.213.150.88 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "201.213.150.88", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: userName=nighthawk ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"201.213.150.88","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=201.213.150.88 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: userName=nighthawk ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"201.213.150.88","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=201.213.150.88 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 filename: dllhost.exe filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 201.213.150.88 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fileName=explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"107.112.89.226","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=nighthawk ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: clientIP=107.112.89.226
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054", "filename": "explorer.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe", "message": "WitFoo-Artifact ::: fileName=explorer.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"nighthawk\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"nighthawk\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@umbrellaelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"107.112.89.226\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=nighthawk ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: clientIP=107.112.89.226", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "107.112.89.226", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fileName=explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"107.112.89.226","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=nighthawk ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: clientIP=107.112.89.226
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: fileName=explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"107.112.89.226","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=nighthawk ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: clientIP=107.112.89.226
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 filename: explorer.exe filepath: \Device\HarddiskVolume3\Windows\explorer.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 107.112.89.226 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"217.23.166.50","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientIP=217.23.166.50 ::: userName=alice ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60", "filename": "pwsh.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe", "message": "WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@starkelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"217.23.166.50\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: streamName=Crowdstrike Detection ::: clientIP=217.23.166.50 ::: userName=alice ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "217.23.166.50", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"217.23.166.50","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientIP=217.23.166.50 ::: userName=alice ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"217.23.166.50","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientIP=217.23.166.50 ::: userName=alice ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 filename: pwsh.exe filepath: \Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 217.23.166.50 userName: alice
Explain this syslog message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cstarke\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attstarked=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"nighthawk","last_seen":"2024-05-10T15:27:29Z","local_ip":"34.55.49.219","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=34.55.49.219 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=nighthawk ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-ff-c8-e9-2f-db", "filehash": "978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b", "filename": "triPOS Setup.exe", "filepath": "\\Device\\HarddiskVolume3\\ProgramData\\Package Cache\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe", "message": "WitFoo-Artifact ::: filePath=\\Device\\HarddiskVolume3\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"458\",\"cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Cstarke\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776\",\"confidence\":60,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"filename\":\"triPOS Setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\ProgramData\\\\Package Cstarke\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"6468e92d1ad408df05df38c1192de790\",\"objective\":\"Follow Through\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Cstarke\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.clean.room=\\\"C:\\\\ProgramData\\\\Package Cstarke\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.filehandle.attstarked=536 -burn.filehandle.self=544 /uninstall\",\"parent_md5\":\"6468e92d1ad408df05df38c1192de790\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295\",\"parent_sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":true,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"ransomware\",\"severity\":50,\"sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"timestamp\":\"2024-05-10T15:46:45Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"nighthawk\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-05-10T15:46:52.112770748Z\",\"date_updated\":\"2024-05-10T15:46:56Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-05-08T23:47:06.818Z\",\"agent_version\":\"7.13.18308.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18308\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"75.231.140.51\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-05-09T03:50:36Z\",\"last_login_user\":\"nighthawk\",\"last_seen\":\"2024-05-10T15:27:29Z\",\"local_ip\":\"34.55.49.219\",\"mac_address\":\"00-ff-c8-e9-2f-db\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-05-10T15:29:07Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-05-10T15:46:45Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-05-10T15:46:45Z\",\"max_confidence\":60,\"max_severity\":50,\"max_severity_displayname\":\"Medium\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=34.55.49.219 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=nighthawk ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "34.55.49.219", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cstarke\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attstarked=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"nighthawk","last_seen":"2024-05-10T15:27:29Z","local_ip":"34.55.49.219","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=34.55.49.219 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=nighthawk ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon
Product: Falcon Vendor: Crowdstrike
Identify this syslog message