input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cstarke\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cstarke\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attstarked=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"nighthawk","last_seen":"2024-05-10T15:27:29Z","local_ip":"34.55.49.219","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=34.55.49.219 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=nighthawk ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-ff-c8-e9-2f-db
filehash: 978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b
filename: triPOS Setup.exe
filepath: \Device\HarddiskVolume3\ProgramData\Package Cache\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 34.55.49.219
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=248.220.181.89 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: userName=nighthawk ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"248.220.181.89","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=dllhost.exe | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=248.220.181.89 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: userName=nighthawk ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mwayneine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:26Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"nighthawk\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:33.847795046Z\",\"date_updated\":\"2024-07-19T12:56:40Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@wayneelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"248.220.181.89\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:26Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:26Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileName=dllhost.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "248.220.181.89",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=248.220.181.89 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: userName=nighthawk ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"248.220.181.89","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=dllhost.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=248.220.181.89 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: userName=nighthawk ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"248.220.181.89","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=dllhost.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 248.220.181.89
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: userName=nighthawk ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"96.177.120.255","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=96.177.120.255 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: userName=nighthawk ::: fileName=dllhost.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:12Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"nighthawk\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:26.823543454Z\",\"date_updated\":\"2024-07-19T12:56:48Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@umbrellaelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"96.177.120.255\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:12Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:12Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=96.177.120.255 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "96.177.120.255",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: userName=nighthawk ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"96.177.120.255","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=96.177.120.255 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: userName=nighthawk ::: fileName=dllhost.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"96.177.120.255","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: clientIP=96.177.120.255 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: messageType=endpoint_protection_event ::: streamName=Crowdstrike Detection | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 96.177.120.255
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=236.38.154.195 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: userName=bob ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"236.38.154.195","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=dllhost.exe | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=236.38.154.195 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: userName=bob ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:26Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"bob\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:33.847795046Z\",\"date_updated\":\"2024-07-19T12:56:40Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@umbrellaelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"236.38.154.195\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:26Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:26Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileName=dllhost.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "236.38.154.195",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=236.38.154.195 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: userName=bob ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"236.38.154.195","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=dllhost.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: program=crowdstrike_falcon ::: clientIP=236.38.154.195 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: userName=bob ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"236.38.154.195","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=dllhost.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 236.38.154.195
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fileName=explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"170.226.222.126","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=bob ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: clientIP=170.226.222.126 | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: fileName=explorer.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"bob\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"bob\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@acmeelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"170.226.222.126\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=bob ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: clientIP=170.226.222.126",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "170.226.222.126",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fileName=explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"170.226.222.126","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=bob ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: clientIP=170.226.222.126 | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: fileName=explorer.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"170.226.222.126","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=SSTEWART-LT3 ::: program=crowdstrike_falcon ::: userName=bob ::: clientMAC=00-15-5d-26-72-11 ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: clientIP=170.226.222.126 | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 170.226.222.126
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"152.241.63.73","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientIP=152.241.63.73 ::: userName=charlie ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60",
"filename": "pwsh.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe",
"message": "WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@acmeelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"152.241.63.73\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: streamName=Crowdstrike Detection ::: clientIP=152.241.63.73 ::: userName=charlie ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "152.241.63.73",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"152.241.63.73","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientIP=152.241.63.73 ::: userName=charlie ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"152.241.63.73","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientIP=152.241.63.73 ::: userName=charlie ::: fileName=pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60
filename: pwsh.exe
filepath: \Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 152.241.63.73
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cwaynee\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attwayneed=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"alice","last_seen":"2024-05-10T15:27:29Z","local_ip":"87.118.112.15","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=87.118.112.15 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=alice ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-ff-c8-e9-2f-db",
"filehash": "978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b",
"filename": "triPOS Setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\ProgramData\\Package Cache\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe",
"message": "WitFoo-Artifact ::: filePath=\\Device\\HarddiskVolume3\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"458\",\"cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Cwaynee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776\",\"confidence\":60,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"filename\":\"triPOS Setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\ProgramData\\\\Package Cwaynee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"6468e92d1ad408df05df38c1192de790\",\"objective\":\"Follow Through\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Cwaynee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.clean.room=\\\"C:\\\\ProgramData\\\\Package Cwaynee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.filehandle.attwayneed=536 -burn.filehandle.self=544 /uninstall\",\"parent_md5\":\"6468e92d1ad408df05df38c1192de790\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295\",\"parent_sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":true,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mwayneine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"ransomware\",\"severity\":50,\"sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"timestamp\":\"2024-05-10T15:46:45Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-05-10T15:46:52.112770748Z\",\"date_updated\":\"2024-05-10T15:46:56Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-05-08T23:47:06.818Z\",\"agent_version\":\"7.13.18308.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18308\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"75.231.140.51\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-05-09T03:50:36Z\",\"last_login_user\":\"alice\",\"last_seen\":\"2024-05-10T15:27:29Z\",\"local_ip\":\"87.118.112.15\",\"mac_address\":\"00-ff-c8-e9-2f-db\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-05-10T15:29:07Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-05-10T15:46:45Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-05-10T15:46:45Z\",\"max_confidence\":60,\"max_severity\":50,\"max_severity_displayname\":\"Medium\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=87.118.112.15 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=alice ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "87.118.112.15",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cwaynee\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attwayneed=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"alice","last_seen":"2024-05-10T15:27:29Z","local_ip":"87.118.112.15","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=87.118.112.15 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=alice ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cwaynee\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attwayneed=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"alice","last_seen":"2024-05-10T15:27:29Z","local_ip":"87.118.112.15","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: messageType=endpoint_protection_event ::: fileName=triPOS Setup.exe ::: clientIP=87.118.112.15 ::: clientHostname=SSTEWART-LT3 ::: clientMAC=00-ff-c8-e9-2f-db ::: userName=alice ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-ff-c8-e9-2f-db
filehash: 978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b
filename: triPOS Setup.exe
filepath: \Device\HarddiskVolume3\ProgramData\Package Cache\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 87.118.112.15
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: userName=charlie ::: fileName=dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"38.182.184.104","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=38.182.184.104 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: userName=charlie ::: fileName=dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:12Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:26.823543454Z\",\"date_updated\":\"2024-07-19T12:56:48Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@umbrellaelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"38.182.184.104\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:12Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:12Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=38.182.184.104 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "38.182.184.104",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: userName=charlie ::: fileName=dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"38.182.184.104","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=38.182.184.104 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: userName=charlie ::: fileName=dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"38.182.184.104","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=38.182.184.104 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 38.182.184.104
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: messageType=endpoint_protection_event ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"165.130.159.155","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: userName=alice ::: fileName=dllhost.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: clientIP=165.130.159.155 ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: messageType=endpoint_protection_event ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:26Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:33.847795046Z\",\"date_updated\":\"2024-07-19T12:56:40Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@starkelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"165.130.159.155\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:26Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:26Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: userName=alice ::: fileName=dllhost.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: clientIP=165.130.159.155 ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "165.130.159.155",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: messageType=endpoint_protection_event ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"165.130.159.155","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: userName=alice ::: fileName=dllhost.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: clientIP=165.130.159.155 ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: messageType=endpoint_protection_event ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"165.130.159.155","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: userName=alice ::: fileName=dllhost.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: clientIP=165.130.159.155 ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 165.130.159.155
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: userName=janedoe ::: fileName=dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"57.37.32.255","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=57.37.32.255 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: userName=janedoe ::: fileName=dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:12Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"janedoe\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:26.823543454Z\",\"date_updated\":\"2024-07-19T12:56:48Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@acmeelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"57.37.32.255\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:12Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:12Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=57.37.32.255 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "57.37.32.255",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: userName=janedoe ::: fileName=dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"57.37.32.255","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=57.37.32.255 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: userName=janedoe ::: fileName=dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"57.37.32.255","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: program=crowdstrike_falcon ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=57.37.32.255 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 57.37.32.255
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"250.218.174.235","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: clientHostname=SSTEWART-LT3 ::: userName=bob ::: messageType=endpoint_protection_event ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: clientIP=250.218.174.235 | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60",
"filename": "pwsh.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe",
"message": "WitFoo-Artifact ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"bob\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"bob\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@umbrellaelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"250.218.174.235\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: clientHostname=SSTEWART-LT3 ::: userName=bob ::: messageType=endpoint_protection_event ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe ::: clientIP=250.218.174.235",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "250.218.174.235",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"250.218.174.235","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: clientHostname=SSTEWART-LT3 ::: userName=bob ::: messageType=endpoint_protection_event ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: clientIP=250.218.174.235 | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"bob"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"250.218.174.235","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: clientHostname=SSTEWART-LT3 ::: userName=bob ::: messageType=endpoint_protection_event ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: clientIP=250.218.174.235 | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60
filename: pwsh.exe
filepath: \Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 250.218.174.235
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: userName=charlie ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"103.234.135.119","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=103.234.135.119 ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileName=explorer.exe | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: userName=charlie ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mumbrellaine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@umbrellaelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"103.234.135.119\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=103.234.135.119 ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileName=explorer.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "103.234.135.119",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: userName=charlie ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"103.234.135.119","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=103.234.135.119 ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileName=explorer.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: userName=charlie ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mumbrellaine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@umbrellaelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"103.234.135.119","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=103.234.135.119 ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileName=explorer.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 103.234.135.119
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: userName=charlie ::: fileName=triPOS Setup.exe ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Coscorpe\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: program=crowdstrike_falcon ::: clientIP=123.5.142.170 ::: clientMAC=00-ff-c8-e9-2f-db ::: streamName=Crowdstrike Detection ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attoscorped=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"charlie","last_seen":"2024-05-10T15:27:29Z","local_ip":"123.5.142.170","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-ff-c8-e9-2f-db",
"filehash": "978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b",
"filename": "triPOS Setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\ProgramData\\Package Cache\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe",
"message": "WitFoo-Artifact ::: userName=charlie ::: fileName=triPOS Setup.exe ::: clientHostname=SSTEWART-LT3 ::: filePath=\\Device\\HarddiskVolume3\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe ::: program=crowdstrike_falcon ::: clientIP=123.5.142.170 ::: clientMAC=00-ff-c8-e9-2f-db ::: streamName=Crowdstrike Detection ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"458\",\"cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Coscorpe\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776\",\"confidence\":60,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"filename\":\"triPOS Setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\ProgramData\\\\Package Coscorpe\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"6468e92d1ad408df05df38c1192de790\",\"objective\":\"Follow Through\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Coscorpe\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.clean.room=\\\"C:\\\\ProgramData\\\\Package Coscorpe\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.filehandle.attoscorped=536 -burn.filehandle.self=544 /uninstall\",\"parent_md5\":\"6468e92d1ad408df05df38c1192de790\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295\",\"parent_sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":true,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"ransomware\",\"severity\":50,\"sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"timestamp\":\"2024-05-10T15:46:45Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-05-10T15:46:52.112770748Z\",\"date_updated\":\"2024-05-10T15:46:56Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-05-08T23:47:06.818Z\",\"agent_version\":\"7.13.18308.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18308\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"75.231.140.51\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-05-09T03:50:36Z\",\"last_login_user\":\"charlie\",\"last_seen\":\"2024-05-10T15:27:29Z\",\"local_ip\":\"123.5.142.170\",\"mac_address\":\"00-ff-c8-e9-2f-db\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-05-10T15:29:07Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-05-10T15:46:45Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-05-10T15:46:45Z\",\"max_confidence\":60,\"max_severity\":50,\"max_severity_displayname\":\"Medium\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: messageType=endpoint_protection_event",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "123.5.142.170",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: userName=charlie ::: fileName=triPOS Setup.exe ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Coscorpe\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: program=crowdstrike_falcon ::: clientIP=123.5.142.170 ::: clientMAC=00-ff-c8-e9-2f-db ::: streamName=Crowdstrike Detection ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attoscorped=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"charlie","last_seen":"2024-05-10T15:27:29Z","local_ip":"123.5.142.170","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: userName=charlie ::: fileName=triPOS Setup.exe ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Coscorpe\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: program=crowdstrike_falcon ::: clientIP=123.5.142.170 ::: clientMAC=00-ff-c8-e9-2f-db ::: streamName=Crowdstrike Detection ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Coscorpe\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attoscorped=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"charlie","last_seen":"2024-05-10T15:27:29Z","local_ip":"123.5.142.170","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-ff-c8-e9-2f-db
filehash: 978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b
filename: triPOS Setup.exe
filepath: \Device\HarddiskVolume3\ProgramData\Package Cache\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 123.5.142.170
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: messageType=endpoint_protection_event ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"83.205.238.91","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: userName=alice ::: fileName=dllhost.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: clientIP=83.205.238.91 ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"filename": "dllhost.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe",
"message": "WitFoo-Artifact ::: messageType=endpoint_protection_event ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:26Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:33.847795046Z\",\"date_updated\":\"2024-07-19T12:56:40Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@acmeelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"83.205.238.91\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:26Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:26Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: userName=alice ::: fileName=dllhost.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: clientIP=83.205.238.91 ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "83.205.238.91",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: messageType=endpoint_protection_event ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"83.205.238.91","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: userName=alice ::: fileName=dllhost.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: clientIP=83.205.238.91 ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: messageType=endpoint_protection_event ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"83.205.238.91","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: userName=alice ::: fileName=dllhost.exe ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: clientHostname=SSTEWART-LT3 ::: streamName=Crowdstrike Detection ::: clientIP=83.205.238.91 ::: program=crowdstrike_falcon ::: clientMAC=00-15-5d-26-72-11 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
filename: dllhost.exe
filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 83.205.238.91
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"222.27.229.232","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: clientHostname=SSTEWART-LT3 ::: userName=alice ::: messageType=endpoint_protection_event ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: clientIP=222.27.229.232 | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60",
"filename": "pwsh.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe",
"message": "WitFoo-Artifact ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@oscorpelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"222.27.229.232\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: clientHostname=SSTEWART-LT3 ::: userName=alice ::: messageType=endpoint_protection_event ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe ::: clientIP=222.27.229.232",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "222.27.229.232",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"222.27.229.232","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: clientHostname=SSTEWART-LT3 ::: userName=alice ::: messageType=endpoint_protection_event ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: clientIP=222.27.229.232 | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"222.27.229.232","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: streamName=Crowdstrike Detection ::: clientHostname=SSTEWART-LT3 ::: userName=alice ::: messageType=endpoint_protection_event ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: clientIP=222.27.229.232 | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60
filename: pwsh.exe
filepath: \Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 222.27.229.232
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: userName=fish ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"129.225.157.164","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=129.225.157.164 ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileName=explorer.exe | {
"clienthostname": "SSTEWART-LT3",
"clientmac": "00-15-5d-26-72-11",
"filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: userName=fish ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"fish\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"fish\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@oscorpelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"129.225.157.164\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=129.225.157.164 ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileName=explorer.exe",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "129.225.157.164",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: userName=fish ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"129.225.157.164","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=129.225.157.164 ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileName=explorer.exe | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: userName=fish ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"fish"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"129.225.157.164","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: messageType=endpoint_protection_event ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: clientMAC=00-15-5d-26-72-11 ::: clientIP=129.225.157.164 ::: streamName=Crowdstrike Detection ::: program=crowdstrike_falcon ::: fileName=explorer.exe | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3
clientmac: 00-15-5d-26-72-11
filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 129.225.157.164
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: userName=nighthawk ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"nighthawk"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"nighthawk","last_seen":"2024-07-19T08:47:56Z","local_ip":"178.92.59.19","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=JBETRO-LT4 ::: clientMAC=00-ff-c0-d6-f8-46 ::: program=crowdstrike_falcon ::: messageType=endpoint_protection_event ::: clientIP=178.92.59.19 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: streamName=Crowdstrike Detection | {
"clienthostname": "JBETRO-LT4",
"clientmac": "00-ff-c0-d6-f8-46",
"filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054",
"filename": "explorer.exe",
"filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe",
"message": "WitFoo-Artifact ::: userName=nighthawk ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\Windows\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T09:06:08Z\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"user_name\":\"nighthawk\"}],\"behaviors_processed\":[\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T09:06:17.051656144Z\",\"date_updated\":\"2024-07-19T09:06:24Z\",\"detection_id\":\"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2024-07-17T07:18:20.541Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.28.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"external_ip\":\"99.56.191.170\",\"first_seen\":\"2023-03-13T11:34:15Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"JBETRO-LT4\",\"last_login_timestamp\":\"2024-07-19T05:29:58Z\",\"last_login_user\":\"nighthawk\",\"last_seen\":\"2024-07-19T08:47:56Z\",\"local_ip\":\"178.92.59.19\",\"mac_address\":\"00-ff-c0-d6-f8-46\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T08:48:28Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Dell G15 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T09:06:08Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T09:06:08Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientHostname=JBETRO-LT4 ::: clientMAC=00-ff-c0-d6-f8-46 ::: program=crowdstrike_falcon ::: messageType=endpoint_protection_event ::: clientIP=178.92.59.19 ::: fileName=explorer.exe ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: streamName=Crowdstrike Detection",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"program": "crowdstrike_falcon",
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"sourceinfo": "unknown",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "178.92.59.19",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: userName=nighthawk ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"nighthawk"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"nighthawk","last_seen":"2024-07-19T08:47:56Z","local_ip":"178.92.59.19","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=JBETRO-LT4 ::: clientMAC=00-ff-c0-d6-f8-46 ::: program=crowdstrike_falcon ::: messageType=endpoint_protection_event ::: clientIP=178.92.59.19 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: streamName=Crowdstrike Detection | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: userName=nighthawk ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"nighthawk"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"nighthawk","last_seen":"2024-07-19T08:47:56Z","local_ip":"178.92.59.19","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientHostname=JBETRO-LT4 ::: clientMAC=00-ff-c0-d6-f8-46 ::: program=crowdstrike_falcon ::: messageType=endpoint_protection_event ::: clientIP=178.92.59.19 ::: fileName=explorer.exe ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: streamName=Crowdstrike Detection | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: JBETRO-LT4
clientmac: 00-ff-c0-d6-f8-46
filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054
filename: explorer.exe
filepath: \Device\HarddiskVolume3\Windows\explorer.exe
messagetype: endpoint_protection_event
productids: [7]
program: crowdstrike_falcon
senderhost: kafka.precinct
sensitivity: normal
sourceinfo: unknown
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 178.92.59.19
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t81.155.88.174\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"81.155.88.174","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:47.122Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t81.155.88.174\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC3.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"81.155.88.174\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127781,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127781",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "81.155.88.174",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t81.155.88.174\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"81.155.88.174","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t81.155.88.174\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"81.155.88.174","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127781
streamName: microsoft-windows-security-auditing
clientIP: 81.155.88.174
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t237.157.215.40\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"237.157.215.40","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:47.122Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t237.157.215.40\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC3.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"237.157.215.40\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127781,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127781",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "237.157.215.40",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t237.157.215.40\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"237.157.215.40","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t237.157.215.40\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"237.157.215.40","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127781
streamName: microsoft-windows-security-auditing
clientIP: 237.157.215.40
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t37.211.203.176\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"37.211.203.176","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:47.131Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t37.211.203.176\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC3.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"37.211.203.176\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":10216}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127782,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127782",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "37.211.203.176",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t37.211.203.176\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"37.211.203.176","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t37.211.203.176\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"37.211.203.176","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127782
streamName: microsoft-windows-security-auditing
clientIP: 37.211.203.176
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t155.18.193.121\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"155.18.193.121","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:47.131Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t155.18.193.121\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"155.18.193.121\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":10216}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127782,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127782",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "155.18.193.121",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t155.18.193.121\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"155.18.193.121","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t155.18.193.121\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"155.18.193.121","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127782
streamName: microsoft-windows-security-auditing
clientIP: 155.18.193.121
userName: nighthawk | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.651Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t116.19.27.105\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"116.19.27.105","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127779,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:46.651Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t116.19.27.105\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC3.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"116.19.27.105\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":10216}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127779,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127779",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "116.19.27.105",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.651Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t116.19.27.105\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"116.19.27.105","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127779,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.651Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t116.19.27.105\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"116.19.27.105","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127779,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127779
streamName: microsoft-windows-security-auditing
clientIP: 116.19.27.105
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.651Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t41.157.161.241\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"41.157.161.241","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127779,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:46.651Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t41.157.161.241\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC3.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"41.157.161.241\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":10216}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127779,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127779",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "41.157.161.241",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.651Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t41.157.161.241\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"41.157.161.241","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127779,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.651Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t41.157.161.241\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"41.157.161.241","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127779,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127779
streamName: microsoft-windows-security-auditing
clientIP: 41.157.161.241
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.613Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t59.160.60.149\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"59.160.60.149","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127777,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:46.613Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t59.160.60.149\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC3.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"59.160.60.149\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":10216}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127777,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127777",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "59.160.60.149",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.613Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t59.160.60.149\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"59.160.60.149","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127777,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.613Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t59.160.60.149\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"59.160.60.149","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127777,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127777
streamName: microsoft-windows-security-auditing
clientIP: 59.160.60.149
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.613Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t50.49.110.205\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"50.49.110.205","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127777,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:46.613Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t50.49.110.205\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC3.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"50.49.110.205\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":10216}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127777,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127777",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "50.49.110.205",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.613Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t50.49.110.205\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"50.49.110.205","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127777,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.613Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t50.49.110.205\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"50.49.110.205","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127777,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127777
streamName: microsoft-windows-security-auditing
clientIP: 50.49.110.205
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.623Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t94.168.170.3\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"94.168.170.3","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127778,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:46.623Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t94.168.170.3\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC3.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"94.168.170.3\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127778,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127778",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "94.168.170.3",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.623Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t94.168.170.3\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"94.168.170.3","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127778,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.623Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t94.168.170.3\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"94.168.170.3","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127778,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127778
streamName: microsoft-windows-security-auditing
clientIP: 94.168.170.3
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.623Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t169.194.208.169\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"169.194.208.169","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127778,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:46.623Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t169.194.208.169\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC3.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"169.194.208.169\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127778,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127778",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "169.194.208.169",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.623Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t169.194.208.169\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"169.194.208.169","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127778,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.623Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t169.194.208.169\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"169.194.208.169","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127778,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127778
streamName: microsoft-windows-security-auditing
clientIP: 169.194.208.169
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.661Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t206.189.191.212\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"206.189.191.212","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127780,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:46.661Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t206.189.191.212\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC3.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"206.189.191.212\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127780,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127780",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "206.189.191.212",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.661Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t206.189.191.212\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"206.189.191.212","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127780,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.661Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t206.189.191.212\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"206.189.191.212","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127780,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127780
streamName: microsoft-windows-security-auditing
clientIP: 206.189.191.212
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.661Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t95.254.148.72\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"95.254.148.72","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127780,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:46.661Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.umbrella.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t95.254.148.72\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"UWDC3.umbrella.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.umbrella.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"95.254.148.72\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127780,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127780",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "95.254.148.72",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.661Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t95.254.148.72\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"95.254.148.72","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127780,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.661Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.umbrella.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t95.254.148.72\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"UWDC3.umbrella.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.umbrella.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"95.254.148.72","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127780,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127780
streamName: microsoft-windows-security-auditing
clientIP: 95.254.148.72
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t133.187.8.32\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"133.187.8.32","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:47.122Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t133.187.8.32\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"133.187.8.32\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127781,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127781",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "133.187.8.32",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t133.187.8.32\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"133.187.8.32","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t133.187.8.32\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"133.187.8.32","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127781
streamName: microsoft-windows-security-auditing
clientIP: 133.187.8.32
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t63.244.221.141\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.244.221.141","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:47.122Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.wayne.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tfish\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t63.244.221.141\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"UWDC3.wayne.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.wayne.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"63.244.221.141\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"fish\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":3808}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127781,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127781",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "63.244.221.141",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t63.244.221.141\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.244.221.141","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.122Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.wayne.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tfish\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t63.244.221.141\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"UWDC3.wayne.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.wayne.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.244.221.141","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"fish","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":3808}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127781,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127781
streamName: microsoft-windows-security-auditing
clientIP: 63.244.221.141
userName: fish | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t49.12.200.108\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"49.12.200.108","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:47.131Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.acme.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjanedoe\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t49.12.200.108\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"UWDC3.acme.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.acme.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"49.12.200.108\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"janedoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":10216}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127782,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127782",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "49.12.200.108",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t49.12.200.108\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"49.12.200.108","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.acme.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjanedoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t49.12.200.108\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"UWDC3.acme.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.acme.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"49.12.200.108","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"janedoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127782
streamName: microsoft-windows-security-auditing
clientIP: 49.12.200.108
userName: janedoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t17.96.199.98\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"17.96.199.98","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:47.131Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.stark.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t17.96.199.98\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"UWDC3.stark.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.stark.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"17.96.199.98\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":10216}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127782,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127782",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "17.96.199.98",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t17.96.199.98\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"17.96.199.98","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:47.131Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.stark.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t17.96.199.98\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"UWDC3.stark.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.stark.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"17.96.199.98","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127782,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127782
streamName: microsoft-windows-security-auditing
clientIP: 17.96.199.98
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.651Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t133.80.3.207\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"133.80.3.207","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127779,"task":"Logon"}} | {
"action": "Logon",
"clientport": 50541,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-05-02T18:04:46.651Z\",\"agent\":{\"ephemeral_id\":\"c876bdd4-a083-4218-9b19-b96b522e0c7a\",\"id\":\"fac0ed02-eb3a-43a4-b281-4f77fb2deecd\",\"name\":\"UWDC3\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-05-02T18:04:47.958Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"UWDC3.oscorp.org\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tHYB-MOMPFQXCQXD\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tHYB-MOMPFQXCQXD\\n\\tSource Network Address:\\t133.80.3.207\\n\\tSource Port:\\t\\t50541\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"UWDC3.oscorp.org\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"UWDC3.oscorp.org\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"133.80.3.207\",\"IpPort\":\"50541\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"HYB-MOMPFQXCQXD\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"HYB-MOMPFQXCQXD\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":708,\"thread\":{\"id\":10216}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":87127779,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "UWDC3.uwca.org",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "87127779",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "133.80.3.207",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.651Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t133.80.3.207\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"133.80.3.207","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127779,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-05-02T18:04:46.651Z","agent":{"ephemeral_id":"c876bdd4-a083-4218-9b19-b96b522e0c7a","id":"fac0ed02-eb3a-43a4-b281-4f77fb2deecd","name":"UWDC3","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-05-02T18:04:47.958Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"UWDC3.oscorp.org"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tHYB-MOMPFQXCQXD\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tHYB-MOMPFQXCQXD\n\tSource Network Address:\t133.80.3.207\n\tSource Port:\t\t50541\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"UWDC3.oscorp.org","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"UWDC3.oscorp.org","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"133.80.3.207","IpPort":"50541","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"HYB-MOMPFQXCQXD","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"HYB-MOMPFQXCQXD"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":708,"thread":{"id":10216}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":87127779,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 50541
messagetype: auth_failure
productids: [6]
senderhost: UWDC3.uwca.org
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 87127779
streamName: microsoft-windows-security-auditing
clientIP: 133.80.3.207
userName: johndoe | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.