input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.acme.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t116.207.226.42\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"NORDC-DC-04.acme.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.acme.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"116.207.226.42","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 55929 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 453526063 streamName: microsoft-windows-security-auditing clientIP: 116.207.226.42 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t150.87.248.142\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-DC-04.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.87.248.142","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
{ "action": "Logon", "clientport": 55929, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.2.2\"},\"@timestamp\":\"2024-07-06T11:13:25.086Z\",\"agent\":{\"ephemeral_id\":\"c7c916ce-56ef-4255-9f46-4ca9ce1b5050\",\"id\":\"9c19b391-75f6-44e4-a324-d6fa6da22ca7\",\"name\":\"NORDC-DC-04\",\"type\":\"winlogbeat\",\"version\":\"8.2.2\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2024-07-06T11:13:26.191Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"NORDC-DC-04.umbrella.com\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\tMDS-ATL\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tSERVICEDESK1\\n\\tSource Network Address:\\t150.87.248.142\\n\\tSource Port:\\t\\t55929\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"NORDC-DC-04.umbrella.com\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"NORDC-DC-04.umbrella.com\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"150.87.248.142\",\"IpPort\":\"55929\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"MDS-ATL\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"SERVICEDESK1\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":660,\"thread\":{\"id\":1332}},\"provider_guid\":\"{54849625-5478-4994-a5ba-3e3b0328c30d}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":453526063,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "NORDC-DC-04.mingledorffs.com", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "453526063", "streamName": "microsoft-windows-security-auditing", "clientIP": "150.87.248.142", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t150.87.248.142\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-DC-04.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.87.248.142","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.2.2"},"@timestamp":"2024-07-06T11:13:25.086Z","agent":{"ephemeral_id":"c7c916ce-56ef-4255-9f46-4ca9ce1b5050","id":"9c19b391-75f6-44e4-a324-d6fa6da22ca7","name":"NORDC-DC-04","type":"winlogbeat","version":"8.2.2"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2024-07-06T11:13:26.191Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"NORDC-DC-04.umbrella.com"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\tMDS-ATL\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tSERVICEDESK1\n\tSource Network Address:\t150.87.248.142\n\tSource Port:\t\t55929\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"NORDC-DC-04.umbrella.com","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"NORDC-DC-04.umbrella.com","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"150.87.248.142","IpPort":"55929","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"MDS-ATL","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"SERVICEDESK1"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":660,"thread":{"id":1332}},"provider_guid":"{54849625-5478-4994-a5ba-3e3b0328c30d}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":453526063,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 55929 messagetype: auth_failure productids: [6] senderhost: NORDC-DC-04.mingledorffs.com sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 453526063 streamName: microsoft-windows-security-auditing clientIP: 150.87.248.142 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t247.21.37.30\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"247.21.37.30","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
{ "action": "Logon", "clientport": 44560, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:18:20.158Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:18:21.492Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t247.21.37.30\\n\\tSource Port:\\t\\t44560\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"247.21.37.30\",\"IpPort\":\"44560\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":23768}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669505238,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669505238", "streamName": "microsoft-windows-security-auditing", "clientIP": "247.21.37.30", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t247.21.37.30\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"247.21.37.30","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t247.21.37.30\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"247.21.37.30","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 44560 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669505238 streamName: microsoft-windows-security-auditing clientIP: 247.21.37.30 userName: nighthawk
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t126.243.95.200\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"126.243.95.200","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
{ "action": "Logon", "clientport": 44560, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:18:20.158Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:18:21.492Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t126.243.95.200\\n\\tSource Port:\\t\\t44560\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"126.243.95.200\",\"IpPort\":\"44560\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":23768}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669505238,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669505238", "streamName": "microsoft-windows-security-auditing", "clientIP": "126.243.95.200", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t126.243.95.200\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"126.243.95.200","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t126.243.95.200\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"126.243.95.200","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 44560 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669505238 streamName: microsoft-windows-security-auditing clientIP: 126.243.95.200 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t109.55.164.191\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"109.55.164.191","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
{ "action": "Logon", "clientport": 44560, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:18:20.158Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:18:21.492Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tcharlie\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t109.55.164.191\\n\\tSource Port:\\t\\t44560\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"acme\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"109.55.164.191\",\"IpPort\":\"44560\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"charlie\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":23768}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669505238,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669505238", "streamName": "microsoft-windows-security-auditing", "clientIP": "109.55.164.191", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t109.55.164.191\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"109.55.164.191","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tcharlie\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t109.55.164.191\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"acme","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"109.55.164.191","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"charlie","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 44560 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669505238 streamName: microsoft-windows-security-auditing clientIP: 109.55.164.191 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t184.237.253.137\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"184.237.253.137","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
{ "action": "Logon", "clientport": 44560, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-12-15T18:18:20.158Z\",\"agent\":{\"ephemeral_id\":\"eabdb759-2a17-4098-b012-9464e78fe4ef\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-12-15T18:18:21.492Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tnighthawk\\n\\tAccount Domain:\\t\\t\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC0000064\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\ttenable-22nf2aba\\n\\tSource Network Address:\\t184.237.253.137\\n\\tSource Port:\\t\\t44560\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"184.237.253.137\",\"IpPort\":\"44560\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc0000064\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetUserName\":\"nighthawk\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"tenable-22nf2aba\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":736,\"thread\":{\"id\":23768}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6669505238,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6669505238", "streamName": "microsoft-windows-security-auditing", "clientIP": "184.237.253.137", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t184.237.253.137\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"184.237.253.137","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-12-15T18:18:20.158Z","agent":{"ephemeral_id":"eabdb759-2a17-4098-b012-9464e78fe4ef","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-12-15T18:18:21.492Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tnighthawk\n\tAccount Domain:\t\t\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC0000064\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\ttenable-22nf2aba\n\tSource Network Address:\t184.237.253.137\n\tSource Port:\t\t44560\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"184.237.253.137","IpPort":"44560","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc0000064","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetUserName":"nighthawk","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"tenable-22nf2aba"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":736,"thread":{"id":23768}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6669505238,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 44560 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6669505238 streamName: microsoft-windows-security-auditing clientIP: 184.237.253.137 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=0.120.124.46 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" QUERY HKLM /F password /t REG_SZ /S /K\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=0.120.124.46 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "0.120.124.46", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=0.120.124.46 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=0.120.124.46 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 0.120.124.46 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=31.200.158.82 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" QUERY HKLM /F password /t REG_SZ /S /K\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=31.200.158.82 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "31.200.158.82", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=31.200.158.82 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=31.200.158.82 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 31.200.158.82 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=2.36.197.196 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\reg.exe\\\" QUERY HKLM /F password /t REG_SZ /S /K\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=2.36.197.196 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "2.36.197.196", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=2.36.197.196 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\system32\\reg.exe\" QUERY HKLM /F password /t REG_SZ /S /K","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often aswayneiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675347806954","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=2.36.197.196 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=nighthawk ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 2.36.197.196 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=51.226.165.24 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:25:24Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=51.226.165.24 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-09T17:25:24Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "51.226.165.24", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=51.226.165.24 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=51.226.165.24 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-09T17:25:24Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 51.226.165.24 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=244.46.62.218 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:25:24Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=244.46.62.218 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-09T17:25:24Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "244.46.62.218", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=244.46.62.218 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=244.46.62.218 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-09T17:25:24Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 244.46.62.218 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=218.6.84.101 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:25:24Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934\",\"sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538\"},\"pattern_disposition\":512,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":true,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=218.6.84.101 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-09T17:25:24Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "218.6.84.101", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=218.6.84.101 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:25:24Z","template_instance_id":"9162","behavior_id":"10250","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597004939672","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599762344934","sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","md5":"7353f60b1739074eb17c5f4dddefe239","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599610894538"},"pattern_disposition":512,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":true,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=218.6.84.101 ::: fileHash=de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=janedoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:25:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:25:24Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-09T17:25:24Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 218.6.84.101 userName: janedoe
Explain this syslog message
<172>Feb 21 2023 00:36:50 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:115.166.64.7/52257 dst outside:218.28.54.42/7680 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 21 2023 00:36:50 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:115.166.64.7/52257 dst outside:218.28.54.42/7680 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 52257, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "115.166.64.7", "serverIP": "218.28.54.42" }
Create a JSON artifact from the message
<172>Feb 21 2023 00:36:50 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:115.166.64.7/52257 dst outside:218.28.54.42/7680 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 21 2023 00:36:50 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:115.166.64.7/52257 dst outside:218.28.54.42/7680 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 7680 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 52257 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 115.166.64.7 serverIP: 218.28.54.42
Explain this syslog message
<172>Feb 21 2023 00:36:50 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:138.100.77.14/52257 dst outside:141.176.107.70/7680 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 21 2023 00:36:50 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:138.100.77.14/52257 dst outside:141.176.107.70/7680 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 52257, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "138.100.77.14", "serverIP": "141.176.107.70" }
Create a JSON artifact from the message
<172>Feb 21 2023 00:36:50 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:138.100.77.14/52257 dst outside:141.176.107.70/7680 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 21 2023 00:36:50 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:138.100.77.14/52257 dst outside:141.176.107.70/7680 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 7680 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 52257 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 138.100.77.14 serverIP: 141.176.107.70
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"203.173.62.103","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=203.173.62.103 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=203.173.62.103 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "arq_@fcdv14.scentegvb.com", "emailsendingserver": "104.131.66.48", "emailsubject": "Se ha generado un nuevo documento fiscal", "filehash": "<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>", "filename": "from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatTime\":\"2023-11-02T14:19:17.000Z\",\"threat\":\"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-31T21:31:45.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Se ha generado un nuevo documento fiscal\",\"quarantineFolder\":\"Quarantine\",\"quarantineRule\":\"inbound_spam\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2712,\"headerFrom\":\"Arq_ <arq_@other.com.0291>\",\"headerReplyTo\":\"arq_@other.com.0291\",\"fromAddress\":[\"arq_@other.com.0291\"],\"ccAddresses\":[],\"replyToAddress\":[\"arq_@other.com.0291\"],\"toAddresses\":[\"adurazo@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171\",\"md5\":\"46c3d9dc9162500435f5870f6bdbb20b\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"b9104adf-6595-12d2-4afa-475205c6bf3e\",\"QID\":\"3u0x5qsdk4-1\",\"GUID\":\"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a\",\"sender\":\"arq_@fcdv14.scentegvb.com\",\"recipient\":[\"adurazo@oscorp.bank\"],\"senderIP\":\"203.173.62.103\",\"messageID\":\"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>\"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=203.173.62.103 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=203.173.62.103 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-31T21:31:45.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "203.173.62.103" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"203.173.62.103","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=203.173.62.103 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=203.173.62.103 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"203.173.62.103","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=203.173.62.103 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=203.173.62.103 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: arq_@fcdv14.scentegvb.com emailsendingserver: 104.131.66.48 emailsubject: Se ha generado un nuevo documento fiscal filehash: <20231031213106.B2AE64CA53@fcdv14.scentegvb.com> filename: from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-31T21:31:45.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 203.173.62.103
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"97.96.91.184","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=97.96.91.184 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=97.96.91.184 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "arq_@fcdv14.scentegvb.com", "emailsendingserver": "104.131.66.48", "emailsubject": "Se ha generado un nuevo documento fiscal", "filehash": "<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>", "filename": "from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatTime\":\"2023-11-02T14:19:17.000Z\",\"threat\":\"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-31T21:31:45.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Se ha generado un nuevo documento fiscal\",\"quarantineFolder\":\"Quarantine\",\"quarantineRule\":\"inbound_spam\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2712,\"headerFrom\":\"Arq_ <arq_@other.com.0291>\",\"headerReplyTo\":\"arq_@other.com.0291\",\"fromAddress\":[\"arq_@other.com.0291\"],\"ccAddresses\":[],\"replyToAddress\":[\"arq_@other.com.0291\"],\"toAddresses\":[\"adurazo@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171\",\"md5\":\"46c3d9dc9162500435f5870f6bdbb20b\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"b9104adf-6595-12d2-4afa-475205c6bf3e\",\"QID\":\"3u0x5qsdk4-1\",\"GUID\":\"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a\",\"sender\":\"arq_@fcdv14.scentegvb.com\",\"recipient\":[\"adurazo@oscorp.bank\"],\"senderIP\":\"97.96.91.184\",\"messageID\":\"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>\"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=97.96.91.184 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=97.96.91.184 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-31T21:31:45.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "97.96.91.184" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"97.96.91.184","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=97.96.91.184 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=97.96.91.184 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"97.96.91.184","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=97.96.91.184 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=97.96.91.184 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: arq_@fcdv14.scentegvb.com emailsendingserver: 104.131.66.48 emailsubject: Se ha generado un nuevo documento fiscal filehash: <20231031213106.B2AE64CA53@fcdv14.scentegvb.com> filename: from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-31T21:31:45.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 97.96.91.184
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@umbrella.bank"],"senderIP":"116.116.174.102","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=116.116.174.102 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=116.116.174.102 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "arq_@fcdv14.scentegvb.com", "emailsendingserver": "104.131.66.48", "emailsubject": "Se ha generado un nuevo documento fiscal", "filehash": "<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>", "filename": "from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatTime\":\"2023-11-02T14:19:17.000Z\",\"threat\":\"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-31T21:31:45.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Se ha generado un nuevo documento fiscal\",\"quarantineFolder\":\"Quarantine\",\"quarantineRule\":\"inbound_spam\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2712,\"headerFrom\":\"Arq_ <arq_@other.com.0291>\",\"headerReplyTo\":\"arq_@other.com.0291\",\"fromAddress\":[\"arq_@other.com.0291\"],\"ccAddresses\":[],\"replyToAddress\":[\"arq_@other.com.0291\"],\"toAddresses\":[\"adurazo@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171\",\"md5\":\"46c3d9dc9162500435f5870f6bdbb20b\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"b9104adf-6595-12d2-4afa-475205c6bf3e\",\"QID\":\"3u0x5qsdk4-1\",\"GUID\":\"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a\",\"sender\":\"arq_@fcdv14.scentegvb.com\",\"recipient\":[\"adurazo@umbrella.bank\"],\"senderIP\":\"116.116.174.102\",\"messageID\":\"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>\"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=116.116.174.102 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=116.116.174.102 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-31T21:31:45.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "116.116.174.102" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@umbrella.bank"],"senderIP":"116.116.174.102","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=116.116.174.102 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=116.116.174.102 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@umbrella.bank"],"senderIP":"116.116.174.102","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=116.116.174.102 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=116.116.174.102 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: arq_@fcdv14.scentegvb.com emailsendingserver: 104.131.66.48 emailsubject: Se ha generado un nuevo documento fiscal filehash: <20231031213106.B2AE64CA53@fcdv14.scentegvb.com> filename: from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-31T21:31:45.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 116.116.174.102
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"168.71.77.166","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=168.71.77.166 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=168.71.77.166 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "arq_@fcdv14.scentegvb.com", "emailsendingserver": "104.131.66.48", "emailsubject": "Se ha generado un nuevo documento fiscal", "filehash": "<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>", "filename": "from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatTime\":\"2023-11-02T14:19:17.000Z\",\"threat\":\"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-31T21:31:45.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Se ha generado un nuevo documento fiscal\",\"quarantineFolder\":\"Quarantine\",\"quarantineRule\":\"inbound_spam\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2712,\"headerFrom\":\"Arq_ <arq_@other.com.0291>\",\"headerReplyTo\":\"arq_@other.com.0291\",\"fromAddress\":[\"arq_@other.com.0291\"],\"ccAddresses\":[],\"replyToAddress\":[\"arq_@other.com.0291\"],\"toAddresses\":[\"adurazo@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171\",\"md5\":\"46c3d9dc9162500435f5870f6bdbb20b\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"b9104adf-6595-12d2-4afa-475205c6bf3e\",\"QID\":\"3u0x5qsdk4-1\",\"GUID\":\"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a\",\"sender\":\"arq_@fcdv14.scentegvb.com\",\"recipient\":[\"adurazo@oscorp.bank\"],\"senderIP\":\"168.71.77.166\",\"messageID\":\"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>\"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=168.71.77.166 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=168.71.77.166 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-31T21:31:45.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "168.71.77.166" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"168.71.77.166","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=168.71.77.166 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=168.71.77.166 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"168.71.77.166","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=168.71.77.166 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=168.71.77.166 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: arq_@fcdv14.scentegvb.com emailsendingserver: 104.131.66.48 emailsubject: Se ha generado un nuevo documento fiscal filehash: <20231031213106.B2AE64CA53@fcdv14.scentegvb.com> filename: from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-31T21:31:45.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 168.71.77.166
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"16.61.124.197","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=16.61.124.197 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=16.61.124.197 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "arq_@fcdv14.scentegvb.com", "emailsendingserver": "104.131.66.48", "emailsubject": "Se ha generado un nuevo documento fiscal", "filehash": "<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>", "filename": "from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatTime\":\"2023-11-02T14:19:17.000Z\",\"threat\":\"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-31T21:31:45.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"oscorp_hosted\",\"subject\":\"Se ha generado un nuevo documento fiscal\",\"quarantineFolder\":\"Quarantine\",\"quarantineRule\":\"inbound_spam\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2712,\"headerFrom\":\"Arq_ <arq_@other.com.0291>\",\"headerReplyTo\":\"arq_@other.com.0291\",\"fromAddress\":[\"arq_@other.com.0291\"],\"ccAddresses\":[],\"replyToAddress\":[\"arq_@other.com.0291\"],\"toAddresses\":[\"adurazo@oscorp.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171\",\"md5\":\"46c3d9dc9162500435f5870f6bdbb20b\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"b9104adf-6595-12d2-4afa-475205c6bf3e\",\"QID\":\"3u0x5qsdk4-1\",\"GUID\":\"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a\",\"sender\":\"arq_@fcdv14.scentegvb.com\",\"recipient\":[\"adurazo@oscorp.bank\"],\"senderIP\":\"16.61.124.197\",\"messageID\":\"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>\"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=16.61.124.197 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=16.61.124.197 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-31T21:31:45.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "16.61.124.197" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"16.61.124.197","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=16.61.124.197 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=16.61.124.197 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"oscorp_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@oscorp.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@oscorp.bank"],"senderIP":"16.61.124.197","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=16.61.124.197 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=16.61.124.197 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: arq_@fcdv14.scentegvb.com emailsendingserver: 104.131.66.48 emailsubject: Se ha generado un nuevo documento fiscal filehash: <20231031213106.B2AE64CA53@fcdv14.scentegvb.com> filename: from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-31T21:31:45.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 16.61.124.197
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@wayne.bank"],"senderIP":"139.133.155.127","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=139.133.155.127 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=139.133.155.127 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "arq_@fcdv14.scentegvb.com", "emailsendingserver": "104.131.66.48", "emailsubject": "Se ha generado un nuevo documento fiscal", "filehash": "<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>", "filename": "from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatTime\":\"2023-11-02T14:19:17.000Z\",\"threat\":\"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-31T21:31:45.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"wayne_hosted\",\"subject\":\"Se ha generado un nuevo documento fiscal\",\"quarantineFolder\":\"Quarantine\",\"quarantineRule\":\"inbound_spam\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2712,\"headerFrom\":\"Arq_ <arq_@other.com.0291>\",\"headerReplyTo\":\"arq_@other.com.0291\",\"fromAddress\":[\"arq_@other.com.0291\"],\"ccAddresses\":[],\"replyToAddress\":[\"arq_@other.com.0291\"],\"toAddresses\":[\"adurazo@wayne.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171\",\"md5\":\"46c3d9dc9162500435f5870f6bdbb20b\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"b9104adf-6595-12d2-4afa-475205c6bf3e\",\"QID\":\"3u0x5qsdk4-1\",\"GUID\":\"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a\",\"sender\":\"arq_@fcdv14.scentegvb.com\",\"recipient\":[\"adurazo@wayne.bank\"],\"senderIP\":\"139.133.155.127\",\"messageID\":\"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>\"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=139.133.155.127 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=139.133.155.127 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-31T21:31:45.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "139.133.155.127" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@wayne.bank"],"senderIP":"139.133.155.127","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=139.133.155.127 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=139.133.155.127 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"wayne_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@wayne.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@wayne.bank"],"senderIP":"139.133.155.127","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=139.133.155.127 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=139.133.155.127 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: arq_@fcdv14.scentegvb.com emailsendingserver: 104.131.66.48 emailsubject: Se ha generado un nuevo documento fiscal filehash: <20231031213106.B2AE64CA53@fcdv14.scentegvb.com> filename: from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-31T21:31:45.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 139.133.155.127
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@umbrella.bank"],"senderIP":"194.100.137.101","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=194.100.137.101 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=194.100.137.101 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "arq_@fcdv14.scentegvb.com", "emailsendingserver": "104.131.66.48", "emailsubject": "Se ha generado un nuevo documento fiscal", "filehash": "<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>", "filename": "from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatTime\":\"2023-11-02T14:19:17.000Z\",\"threat\":\"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-31T21:31:45.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"umbrella_hosted\",\"subject\":\"Se ha generado un nuevo documento fiscal\",\"quarantineFolder\":\"Quarantine\",\"quarantineRule\":\"inbound_spam\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2712,\"headerFrom\":\"Arq_ <arq_@other.com.0291>\",\"headerReplyTo\":\"arq_@other.com.0291\",\"fromAddress\":[\"arq_@other.com.0291\"],\"ccAddresses\":[],\"replyToAddress\":[\"arq_@other.com.0291\"],\"toAddresses\":[\"adurazo@umbrella.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171\",\"md5\":\"46c3d9dc9162500435f5870f6bdbb20b\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"b9104adf-6595-12d2-4afa-475205c6bf3e\",\"QID\":\"3u0x5qsdk4-1\",\"GUID\":\"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a\",\"sender\":\"arq_@fcdv14.scentegvb.com\",\"recipient\":[\"adurazo@umbrella.bank\"],\"senderIP\":\"194.100.137.101\",\"messageID\":\"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>\"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=194.100.137.101 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=194.100.137.101 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-31T21:31:45.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "194.100.137.101" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@umbrella.bank"],"senderIP":"194.100.137.101","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=194.100.137.101 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=194.100.137.101 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"umbrella_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@umbrella.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@umbrella.bank"],"senderIP":"194.100.137.101","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=194.100.137.101 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=194.100.137.101 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: arq_@fcdv14.scentegvb.com emailsendingserver: 104.131.66.48 emailsubject: Se ha generado un nuevo documento fiscal filehash: <20231031213106.B2AE64CA53@fcdv14.scentegvb.com> filename: from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-31T21:31:45.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 194.100.137.101
Explain this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@acme.bank"],"senderIP":"226.126.45.157","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=226.126.45.157 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=226.126.45.157 ::: pipelineEntrypoint=dispatch
{ "action": "block", "emailfrom": "arq_@fcdv14.scentegvb.com", "emailsendingserver": "104.131.66.48", "emailsubject": "Se ha generado un nuevo documento fiscal", "filehash": "<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>", "filename": "from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal", "message": "WitFoo-Artifact ::: action=block ::: message={\"spamScore\":0,\"phishScore\":0,\"threatsInfoMap\":[{\"threatID\":\"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatStatus\":\"active\",\"classification\":\"phish\",\"threatUrl\":\"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280\",\"threatTime\":\"2023-11-02T14:19:17.000Z\",\"threat\":\"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/\",\"campaignID\":null,\"threatType\":\"url\"}],\"messageTime\":\"2023-10-31T21:31:45.000Z\",\"impostorScore\":0,\"malwareScore\":0,\"cluster\":\"acme_hosted\",\"subject\":\"Se ha generado un nuevo documento fiscal\",\"quarantineFolder\":\"Quarantine\",\"quarantineRule\":\"inbound_spam\",\"policyRoutes\":[\"default_inbound\"],\"modulesRun\":[\"av\",\"spf\",\"spam\",\"dmarc\",\"pdr\",\"urldefense\"],\"messageSize\":2712,\"headerFrom\":\"Arq_ <arq_@other.com.0291>\",\"headerReplyTo\":\"arq_@other.com.0291\",\"fromAddress\":[\"arq_@other.com.0291\"],\"ccAddresses\":[],\"replyToAddress\":[\"arq_@other.com.0291\"],\"toAddresses\":[\"adurazo@acme.bank\"],\"xmailer\":null,\"messageParts\":[{\"disposition\":\"inline\",\"sha256\":\"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171\",\"md5\":\"46c3d9dc9162500435f5870f6bdbb20b\",\"filename\":\"text.html\",\"sandboxStatus\":null,\"oContentType\":\"text/html\",\"contentType\":\"text/html\"}],\"completelyRewritten\":false,\"id\":\"b9104adf-6595-12d2-4afa-475205c6bf3e\",\"QID\":\"3u0x5qsdk4-1\",\"GUID\":\"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a\",\"sender\":\"arq_@fcdv14.scentegvb.com\",\"recipient\":[\"adurazo@acme.bank\"],\"senderIP\":\"226.126.45.157\",\"messageID\":\"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>\"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=226.126.45.157 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=226.126.45.157 ::: pipelineEntrypoint=dispatch", "messagetype": "email_protection_event", "productids": [ 32 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 2, "severitylabel": "critical", "sourceinfo": "unknown", "starttimeutc": "2023-10-31T21:31:45.000Z", "tags": [ "proofpoint_protect", "email_protection_event" ], "vendorcode": "blocked_message", "streamName": "proofpoint_protect", "serverIP": "226.126.45.157" }
Create a JSON artifact from the message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@acme.bank"],"senderIP":"226.126.45.157","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=226.126.45.157 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=226.126.45.157 ::: pipelineEntrypoint=dispatch
Product: Protect Vendor: ProofPoint
Identify this syslog message
WitFoo-Artifact ::: action=block ::: message={"spamScore":0,"phishScore":0,"threatsInfoMap":[{"threatID":"0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatStatus":"active","classification":"phish","threatUrl":"https://threatinsight.proofpoint.com/4a6c87e3-5385-8727-3248-aa120bda900c/threat/email/0742d0271711c3b98ab49756a336e410ab473a6924c84778fb50894f67fb5280","threatTime":"2023-11-02T14:19:17.000Z","threat":"https://inicasalafactsolutionesofic.westus3.cloudapp.azure.com/","campaignID":null,"threatType":"url"}],"messageTime":"2023-10-31T21:31:45.000Z","impostorScore":0,"malwareScore":0,"cluster":"acme_hosted","subject":"Se ha generado un nuevo documento fiscal","quarantineFolder":"Quarantine","quarantineRule":"inbound_spam","policyRoutes":["default_inbound"],"modulesRun":["av","spf","spam","dmarc","pdr","urldefense"],"messageSize":2712,"headerFrom":"Arq_ <arq_@other.com.0291>","headerReplyTo":"arq_@other.com.0291","fromAddress":["arq_@other.com.0291"],"ccAddresses":[],"replyToAddress":["arq_@other.com.0291"],"toAddresses":["adurazo@acme.bank"],"xmailer":null,"messageParts":[{"disposition":"inline","sha256":"83c425ff80fe28a057b4cdb46e75b9f12d6196248e3e06d17f040a0762107171","md5":"46c3d9dc9162500435f5870f6bdbb20b","filename":"text.html","sandboxStatus":null,"oContentType":"text/html","contentType":"text/html"}],"completelyRewritten":false,"id":"b9104adf-6595-12d2-4afa-475205c6bf3e","QID":"3u0x5qsdk4-1","GUID":"U2iQ9MpdoYUSLFypR2JuBVjdxX-ypP8a","sender":"arq_@fcdv14.scentegvb.com","recipient":["adurazo@acme.bank"],"senderIP":"226.126.45.157","messageID":"<20231031213106.B2AE64CA53@fcdv14.scentegvb.com>"} ::: fileHash=<20231031213106.B2AE64CA53@fcdv14.scentegvb.com> ::: fileName=from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal ::: serverIP=226.126.45.157 ::: emailFrom=arq_@fcdv14.scentegvb.com ::: created_at=2023-10-31T21:31:45.000Z ::: streamName=proofpoint_protect ::: vendorCode=blocked_message ::: messageType=email_protection_event ::: emailSubject=Se ha generado un nuevo documento fiscal ::: pipelineName=proofpoint_protect ::: severityCode=2 ::: startTimeUTC=2023-10-31T21:31:45.000Z ::: emailSendingServer=226.126.45.157 ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Protect by ProofPoint. The following fields were extracted from the message: action: block emailfrom: arq_@fcdv14.scentegvb.com emailsendingserver: 104.131.66.48 emailsubject: Se ha generado un nuevo documento fiscal filehash: <20231031213106.B2AE64CA53@fcdv14.scentegvb.com> filename: from: arq_@fcdv14.scentegvb.com subj: Se ha generado un nuevo documento fiscal messagetype: email_protection_event productids: [32] senderhost: kafka.precinct sensitivity: normal severitycode: 2 severitylabel: critical sourceinfo: unknown starttimeutc: 2023-10-31T21:31:45.000Z tags: ['proofpoint_protect', 'email_protection_event'] vendorcode: blocked_message streamName: proofpoint_protect serverIP: 226.126.45.157
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=166.196.54.129 ::: message={"access_device":{"epkey":"EP8GO8UIPR83OS0AJ5O6","hostname":null,"ip":"23.56.103.157","location":{"city":"Cumming","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"166.196.54.129","key":"DP0W9R0H7R0WJ4GY2HK8","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"phone2 (314-537-1336)"},"email":"jbetro@acmeelectric.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-16T11:21:45.456674+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1663327305,"txid":"8c0e235b-1668-4d13-a653-52b846d72a2e","user":{"groups":[],"key":"DUCOEHG5PIQG8MF7JIQ7","name":"janedoe"}} ::: clientIP=23.56.103.157 ::: userName=janedoe ::: created_at=1663327305 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1663327305 ::: clientHostname=phone2 (314-537-1336) ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1663327305", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "166.196.54.129", "sensitivity": "normal", "application": "LastPass", "messagetype": "credential_access", "clienthostname": "phone2 (314-537-1336)", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=166.196.54.129 ::: message={\"access_device\":{\"epkey\":\"EP8GO8UIPR83OS0AJ5O6\",\"hostname\":null,\"ip\":\"23.56.103.157\",\"location\":{\"city\":\"Cumming\",\"country\":\"United States\",\"state\":\"Georgia\"}},\"alias\":\"\",\"application\":{\"key\":\"DI5NR1TYEZ6N0Y46F8AN\",\"name\":\"LastPass\"},\"auth_device\":{\"ip\":\"166.196.54.129\",\"key\":\"DP0W9R0H7R0WJ4GY2HK8\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"phone2 (314-537-1336)\"},\"email\":\"jbetro@acmeelectric.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-16T11:21:45.456674+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1663327305,\"txid\":\"8c0e235b-1668-4d13-a653-52b846d72a2e\",\"user\":{\"groups\":[],\"key\":\"DUCOEHG5PIQG8MF7JIQ7\",\"name\":\"janedoe\"}} ::: clientIP=23.56.103.157 ::: userName=janedoe ::: created_at=1663327305 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1663327305 ::: clientHostname=phone2 (314-537-1336) ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "23.56.103.157", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=166.196.54.129 ::: message={"access_device":{"epkey":"EP8GO8UIPR83OS0AJ5O6","hostname":null,"ip":"23.56.103.157","location":{"city":"Cumming","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"166.196.54.129","key":"DP0W9R0H7R0WJ4GY2HK8","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"phone2 (314-537-1336)"},"email":"jbetro@acmeelectric.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-16T11:21:45.456674+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1663327305,"txid":"8c0e235b-1668-4d13-a653-52b846d72a2e","user":{"groups":[],"key":"DUCOEHG5PIQG8MF7JIQ7","name":"janedoe"}} ::: clientIP=23.56.103.157 ::: userName=janedoe ::: created_at=1663327305 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1663327305 ::: clientHostname=phone2 (314-537-1336) ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=166.196.54.129 ::: message={"access_device":{"epkey":"EP8GO8UIPR83OS0AJ5O6","hostname":null,"ip":"23.56.103.157","location":{"city":"Cumming","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"166.196.54.129","key":"DP0W9R0H7R0WJ4GY2HK8","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"phone2 (314-537-1336)"},"email":"jbetro@acmeelectric.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-16T11:21:45.456674+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1663327305,"txid":"8c0e235b-1668-4d13-a653-52b846d72a2e","user":{"groups":[],"key":"DUCOEHG5PIQG8MF7JIQ7","name":"janedoe"}} ::: clientIP=23.56.103.157 ::: userName=janedoe ::: created_at=1663327305 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1663327305 ::: clientHostname=phone2 (314-537-1336) ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 1663327305 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 166.196.54.129 sensitivity: normal application: LastPass messagetype: credential_access clienthostname: phone2 (314-537-1336) streamName: DUO clientIP: 23.56.103.157 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=166.196.54.129 ::: message={"access_device":{"epkey":"EP8GO8UIPR83OS0AJ5O6","hostname":null,"ip":"178.133.183.244","location":{"city":"Cumming","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"166.196.54.129","key":"DP0W9R0H7R0WJ4GY2HK8","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"phone2 (314-537-1336)"},"email":"jbetro@oscorpelectric.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-16T11:21:45.456674+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1663327305,"txid":"8c0e235b-1668-4d13-a653-52b846d72a2e","user":{"groups":[],"key":"DUCOEHG5PIQG8MF7JIQ7","name":"fish"}} ::: clientIP=178.133.183.244 ::: userName=fish ::: created_at=1663327305 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1663327305 ::: clientHostname=phone2 (314-537-1336) ::: pipelineEntrypoint=dispatch
{ "senderhost": "localhost", "severitylabel": "critical", "starttimeutc": "1663327305", "tags": [ "DUO", "credential_access" ], "productids": [ 0 ], "severitycode": 2, "sourceinfo": "unknown", "localip": "166.196.54.129", "sensitivity": "normal", "application": "LastPass", "messagetype": "credential_access", "clienthostname": "phone2 (314-537-1336)", "message": "WitFoo-Artifact ::: tags=[\"result=success\",\"reason=user_approved\"] ::: localIP=166.196.54.129 ::: message={\"access_device\":{\"epkey\":\"EP8GO8UIPR83OS0AJ5O6\",\"hostname\":null,\"ip\":\"178.133.183.244\",\"location\":{\"city\":\"Cumming\",\"country\":\"United States\",\"state\":\"Georgia\"}},\"alias\":\"\",\"application\":{\"key\":\"DI5NR1TYEZ6N0Y46F8AN\",\"name\":\"LastPass\"},\"auth_device\":{\"ip\":\"166.196.54.129\",\"key\":\"DP0W9R0H7R0WJ4GY2HK8\",\"location\":{\"city\":\"Atlanta\",\"country\":\"United States\",\"state\":\"Georgia\"},\"name\":\"phone2 (314-537-1336)\"},\"email\":\"jbetro@oscorpelectric.com\",\"event_type\":\"authentication\",\"factor\":\"duo_push\",\"isotimestamp\":\"2022-09-16T11:21:45.456674+00:00\",\"ood_software\":null,\"reason\":\"user_approved\",\"result\":\"success\",\"timestamp\":1663327305,\"txid\":\"8c0e235b-1668-4d13-a653-52b846d72a2e\",\"user\":{\"groups\":[],\"key\":\"DUCOEHG5PIQG8MF7JIQ7\",\"name\":\"fish\"}} ::: clientIP=178.133.183.244 ::: userName=fish ::: created_at=1663327305 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1663327305 ::: clientHostname=phone2 (314-537-1336) ::: pipelineEntrypoint=dispatch", "streamName": "DUO", "clientIP": "178.133.183.244", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=166.196.54.129 ::: message={"access_device":{"epkey":"EP8GO8UIPR83OS0AJ5O6","hostname":null,"ip":"178.133.183.244","location":{"city":"Cumming","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"166.196.54.129","key":"DP0W9R0H7R0WJ4GY2HK8","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"phone2 (314-537-1336)"},"email":"jbetro@oscorpelectric.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-16T11:21:45.456674+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1663327305,"txid":"8c0e235b-1668-4d13-a653-52b846d72a2e","user":{"groups":[],"key":"DUCOEHG5PIQG8MF7JIQ7","name":"fish"}} ::: clientIP=178.133.183.244 ::: userName=fish ::: created_at=1663327305 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1663327305 ::: clientHostname=phone2 (314-537-1336) ::: pipelineEntrypoint=dispatch
Product: DUO Vendor: DUO
Identify this syslog message
WitFoo-Artifact ::: tags=["result=success","reason=user_approved"] ::: localIP=166.196.54.129 ::: message={"access_device":{"epkey":"EP8GO8UIPR83OS0AJ5O6","hostname":null,"ip":"178.133.183.244","location":{"city":"Cumming","country":"United States","state":"Georgia"}},"alias":"","application":{"key":"DI5NR1TYEZ6N0Y46F8AN","name":"LastPass"},"auth_device":{"ip":"166.196.54.129","key":"DP0W9R0H7R0WJ4GY2HK8","location":{"city":"Atlanta","country":"United States","state":"Georgia"},"name":"phone2 (314-537-1336)"},"email":"jbetro@oscorpelectric.com","event_type":"authentication","factor":"duo_push","isotimestamp":"2022-09-16T11:21:45.456674+00:00","ood_software":null,"reason":"user_approved","result":"success","timestamp":1663327305,"txid":"8c0e235b-1668-4d13-a653-52b846d72a2e","user":{"groups":[],"key":"DUCOEHG5PIQG8MF7JIQ7","name":"fish"}} ::: clientIP=178.133.183.244 ::: userName=fish ::: created_at=1663327305 ::: streamName=DUO ::: application=LastPass ::: messageType=credential_access ::: pipelineName=DUO ::: severityCode=2 ::: startTimeUTC=1663327305 ::: clientHostname=phone2 (314-537-1336) ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called DUO by DUO. The following fields were extracted from the message: senderhost: localhost severitylabel: critical starttimeutc: 1663327305 tags: ['DUO', 'credential_access'] productids: [0] severitycode: 2 sourceinfo: unknown localip: 166.196.54.129 sensitivity: normal application: LastPass messagetype: credential_access clienthostname: phone2 (314-537-1336) streamName: DUO clientIP: 178.133.183.244 userName: fish
Explain this syslog message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=johndoe ::: fileName=explorer.exe ::: program=crowdstrike_falcon ::: clientMAC=00-ff-c0-d6-f8-46 ::: messageType=endpoint_protection_event ::: clientHostname=JBETRO-LT4 ::: clientIP=159.27.188.68 ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"johndoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"johndoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"159.27.188.68","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"}
{ "clienthostname": "JBETRO-LT4", "clientmac": "00-ff-c0-d6-f8-46", "filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054", "filename": "explorer.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe", "message": "WitFoo-Artifact ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: userName=johndoe ::: fileName=explorer.exe ::: program=crowdstrike_falcon ::: clientMAC=00-ff-c0-d6-f8-46 ::: messageType=endpoint_protection_event ::: clientHostname=JBETRO-LT4 ::: clientIP=159.27.188.68 ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\Windows\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T09:06:08Z\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"user_name\":\"johndoe\"}],\"behaviors_processed\":[\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T09:06:17.051656144Z\",\"date_updated\":\"2024-07-19T09:06:24Z\",\"detection_id\":\"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2024-07-17T07:18:20.541Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.28.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"external_ip\":\"99.56.191.170\",\"first_seen\":\"2023-03-13T11:34:15Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"JBETRO-LT4\",\"last_login_timestamp\":\"2024-07-19T05:29:58Z\",\"last_login_user\":\"johndoe\",\"last_seen\":\"2024-07-19T08:47:56Z\",\"local_ip\":\"159.27.188.68\",\"mac_address\":\"00-ff-c0-d6-f8-46\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T08:48:28Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Dell G15 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T09:06:08Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T09:06:08Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"}", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "159.27.188.68", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=johndoe ::: fileName=explorer.exe ::: program=crowdstrike_falcon ::: clientMAC=00-ff-c0-d6-f8-46 ::: messageType=endpoint_protection_event ::: clientHostname=JBETRO-LT4 ::: clientIP=159.27.188.68 ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"johndoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"johndoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"159.27.188.68","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"}
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=johndoe ::: fileName=explorer.exe ::: program=crowdstrike_falcon ::: clientMAC=00-ff-c0-d6-f8-46 ::: messageType=endpoint_protection_event ::: clientHostname=JBETRO-LT4 ::: clientIP=159.27.188.68 ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"johndoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"johndoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"159.27.188.68","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"}
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: JBETRO-LT4 clientmac: 00-ff-c0-d6-f8-46 filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 filename: explorer.exe filepath: \Device\HarddiskVolume3\Windows\explorer.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 159.27.188.68 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4959m -classpath \"zap-2.14.0.jar\" org.zaproxy.zap.ZAP","confidence":100,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:214748690396","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"Detect OnWrite Adware/PUP Hash","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","ioc_source":"file_write","ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files\\ZAP\\Zed Attack Proxy\\ZAP.exe\" ","parent_md5":"4bf8d9dff4936e44dbde2f3227a17064","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153079061711","parent_sha256":"9abd01e48d71838c047db584bfe975178cdcf0781f62ee2eab7df8194205ebb6"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2024-06-14T12:05:32Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"alice"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-06-14T12:05:39.498264764Z","date_updated":"2024-06-14T12:05:45Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:214748690396","device":{"agent_load_flags":"1","agent_local_time":"2024-06-12T16:01:53.360Z","agent_version":"7.15.18511.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18511","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-06-14T11:27:09Z","last_login_user":"alice","last_seen":"2024-06-14T11:51:08Z","local_ip":"241.31.37.119","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-06-14T11:51:17Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-06-14T12:05:32Z","hostinfo":{"domain":""},"last_behavior":"2024-06-14T12:05:32Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"6e36ac138a7a426fa5d2e4a45da72961_e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientHostname=JBETRO-LT4 ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: messageType=endpoint_protection_event ::: fileName=javaw.exe ::: userName=alice ::: clientIP=241.31.37.119 ::: clientMAC=00-ff-c0-d6-f8-46 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851
{ "clienthostname": "JBETRO-LT4", "clientmac": "00-ff-c0-d6-f8-46", "filehash": "e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851", "filename": "javaw.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe", "message": "WitFoo-Artifact ::: program=crowdstrike_falcon ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"4748\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\\\" -Xmx4959m -classpath \\\"zap-2.14.0.jar\\\" org.zaproxy.zap.ZAP\",\"confidence\":100,\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:214748690396\",\"description\":\"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"display_name\":\"Detect OnWrite Adware/PUP Hash\",\"filename\":\"javaw.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\Java\\\\jdk-20\\\\bin\\\\javaw.exe\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\alice\\\\ZAP\\\\fuzzers\\\\fuzzdb\\\\web-backdoors\\\\exe\\\\nc.exe\",\"ioc_source\":\"file_write\",\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"md5\":\"\",\"objective\":\"Falcon Detection Method\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\Program Files\\\\ZAP\\\\Zed Attack Proxy\\\\ZAP.exe\\\" \",\"parent_md5\":\"4bf8d9dff4936e44dbde2f3227a17064\",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2153079061711\",\"parent_sha256\":\"9abd01e48d71838c047db584bfe975178cdcf0781f62ee2eab7df8194205ebb6\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":true,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"NGAV\",\"severity\":30,\"sha256\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"tactic\":\"Malware\",\"tactic_id\":\"CSTA0001\",\"technique\":\"PUP\",\"technique_id\":\"CST0013\",\"timestamp\":\"2024-06-14T12:05:32Z\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221:4748\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-06-14T12:05:39.498264764Z\",\"date_updated\":\"2024-06-14T12:05:45Z\",\"detection_id\":\"ldt:6e36ac138a7a426fa5d2e4a45da72961:214748690396\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-06-12T16:01:53.360Z\",\"agent_version\":\"7.15.18511.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.28.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18511\",\"config_id_platform\":\"3\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"external_ip\":\"99.56.191.170\",\"first_seen\":\"2023-03-13T11:34:15Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"JBETRO-LT4\",\"last_login_timestamp\":\"2024-06-14T11:27:09Z\",\"last_login_user\":\"alice\",\"last_seen\":\"2024-06-14T11:51:08Z\",\"local_ip\":\"241.31.37.119\",\"mac_address\":\"00-ff-c0-d6-f8-46\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-06-14T11:51:17Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Dell G15 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-06-14T12:05:32Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-06-14T12:05:32Z\",\"max_confidence\":100,\"max_severity\":30,\"max_severity_displayname\":\"Low\",\"quarantined_files\":[{\"id\":\"6e36ac138a7a426fa5d2e4a45da72961_e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"sha256\":\"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851\",\"state\":\"quarantined\"}],\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: streamName=Crowdstrike Detection ::: clientHostname=JBETRO-LT4 ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe ::: messageType=endpoint_protection_event ::: fileName=javaw.exe ::: userName=alice ::: clientIP=241.31.37.119 ::: clientMAC=00-ff-c0-d6-f8-46 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "241.31.37.119", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4959m -classpath \"zap-2.14.0.jar\" org.zaproxy.zap.ZAP","confidence":100,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:214748690396","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"Detect OnWrite Adware/PUP Hash","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","ioc_source":"file_write","ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files\\ZAP\\Zed Attack Proxy\\ZAP.exe\" ","parent_md5":"4bf8d9dff4936e44dbde2f3227a17064","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153079061711","parent_sha256":"9abd01e48d71838c047db584bfe975178cdcf0781f62ee2eab7df8194205ebb6"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2024-06-14T12:05:32Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"alice"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-06-14T12:05:39.498264764Z","date_updated":"2024-06-14T12:05:45Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:214748690396","device":{"agent_load_flags":"1","agent_local_time":"2024-06-12T16:01:53.360Z","agent_version":"7.15.18511.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18511","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-06-14T11:27:09Z","last_login_user":"alice","last_seen":"2024-06-14T11:51:08Z","local_ip":"241.31.37.119","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-06-14T11:51:17Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-06-14T12:05:32Z","hostinfo":{"domain":""},"last_behavior":"2024-06-14T12:05:32Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"6e36ac138a7a426fa5d2e4a45da72961_e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientHostname=JBETRO-LT4 ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: messageType=endpoint_protection_event ::: fileName=javaw.exe ::: userName=alice ::: clientIP=241.31.37.119 ::: clientMAC=00-ff-c0-d6-f8-46 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: program=crowdstrike_falcon ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"4748","cmdline":"\"C:\\Program Files\\Java\\jdk-20\\bin\\javaw.exe\" -Xmx4959m -classpath \"zap-2.14.0.jar\" org.zaproxy.zap.ZAP","confidence":100,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:214748690396","description":"A file written to the file-system was classified as Adware/PUP based on its SHA256 hash.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"Detect OnWrite Adware/PUP Hash","filename":"javaw.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\Java\\jdk-20\\bin\\javaw.exe","ioc_description":"\\Device\\HarddiskVolume3\\Users\\alice\\ZAP\\fuzzers\\fuzzdb\\web-backdoors\\exe\\nc.exe","ioc_source":"file_write","ioc_type":"hash_sha256","ioc_value":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","md5":"","objective":"Falcon Detection Method","parent_details":{"parent_cmdline":"\"C:\\Program Files\\ZAP\\Zed Attack Proxy\\ZAP.exe\" ","parent_md5":"4bf8d9dff4936e44dbde2f3227a17064","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153079061711","parent_sha256":"9abd01e48d71838c047db584bfe975178cdcf0781f62ee2eab7df8194205ebb6"},"pattern_disposition":128,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":true,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"NGAV","severity":30,"sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","tactic":"Malware","tactic_id":"CSTA0001","technique":"PUP","technique_id":"CST0013","timestamp":"2024-06-14T12:05:32Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"alice"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2153081097221:4748"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-06-14T12:05:39.498264764Z","date_updated":"2024-06-14T12:05:45Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:214748690396","device":{"agent_load_flags":"1","agent_local_time":"2024-06-12T16:01:53.360Z","agent_version":"7.15.18511.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18511","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-06-14T11:27:09Z","last_login_user":"alice","last_seen":"2024-06-14T11:51:08Z","local_ip":"241.31.37.119","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-06-14T11:51:17Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-06-14T12:05:32Z","hostinfo":{"domain":""},"last_behavior":"2024-06-14T12:05:32Z","max_confidence":100,"max_severity":30,"max_severity_displayname":"Low","quarantined_files":[{"id":"6e36ac138a7a426fa5d2e4a45da72961_e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","sha256":"e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851","state":"quarantined"}],"seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: streamName=Crowdstrike Detection ::: clientHostname=JBETRO-LT4 ::: filePath=\Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe ::: messageType=endpoint_protection_event ::: fileName=javaw.exe ::: userName=alice ::: clientIP=241.31.37.119 ::: clientMAC=00-ff-c0-d6-f8-46 ::: fileHash=e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: JBETRO-LT4 clientmac: 00-ff-c0-d6-f8-46 filehash: e355a8decae502578e5bb649b4336b89b13c5daa07b2b23c6737989ecc0fa851 filename: javaw.exe filepath: \Device\HarddiskVolume3\Program Files\Java\jdk-20\bin\javaw.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 241.31.37.119 userName: alice
Explain this syslog message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=janedoe ::: fileName=explorer.exe ::: program=crowdstrike_falcon ::: clientMAC=00-ff-c0-d6-f8-46 ::: messageType=endpoint_protection_event ::: clientHostname=JBETRO-LT4 ::: clientIP=70.172.9.75 ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"janedoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"janedoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"70.172.9.75","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"}
{ "clienthostname": "JBETRO-LT4", "clientmac": "00-ff-c0-d6-f8-46", "filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054", "filename": "explorer.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe", "message": "WitFoo-Artifact ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: userName=janedoe ::: fileName=explorer.exe ::: program=crowdstrike_falcon ::: clientMAC=00-ff-c0-d6-f8-46 ::: messageType=endpoint_protection_event ::: clientHostname=JBETRO-LT4 ::: clientIP=70.172.9.75 ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\Windows\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T09:06:08Z\",\"triggering_process_graph_id\":\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807\",\"user_id\":\"S-1-12-1-1960846385-1299844409-3992341668-2149414984\",\"user_name\":\"janedoe\"}],\"behaviors_processed\":[\"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T09:06:17.051656144Z\",\"date_updated\":\"2024-07-19T09:06:24Z\",\"detection_id\":\"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035\",\"device\":{\"agent_load_flags\":\"0\",\"agent_local_time\":\"2024-07-17T07:18:20.541Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.28.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"6e36ac138a7a426fa5d2e4a45da72961\",\"external_ip\":\"99.56.191.170\",\"first_seen\":\"2023-03-13T11:34:15Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"JBETRO-LT4\",\"last_login_timestamp\":\"2024-07-19T05:29:58Z\",\"last_login_user\":\"janedoe\",\"last_seen\":\"2024-07-19T08:47:56Z\",\"local_ip\":\"70.172.9.75\",\"mac_address\":\"00-ff-c0-d6-f8-46\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T08:48:28Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Dell G15 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T09:06:08Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T09:06:08Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"}", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "70.172.9.75", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=janedoe ::: fileName=explorer.exe ::: program=crowdstrike_falcon ::: clientMAC=00-ff-c0-d6-f8-46 ::: messageType=endpoint_protection_event ::: clientHostname=JBETRO-LT4 ::: clientIP=70.172.9.75 ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"janedoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"janedoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"70.172.9.75","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"}
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: userName=janedoe ::: fileName=explorer.exe ::: program=crowdstrike_falcon ::: clientMAC=00-ff-c0-d6-f8-46 ::: messageType=endpoint_protection_event ::: clientHostname=JBETRO-LT4 ::: clientIP=70.172.9.75 ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: streamName=Crowdstrike Detection ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\Windows\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:6e36ac138a7a426fa5d2e4a45da72961:223339237035","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"6e36ac138a7a426fa5d2e4a45da72961","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\Windows\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281788360679","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T09:06:08Z","triggering_process_graph_id":"pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807","user_id":"S-1-12-1-1960846385-1299844409-3992341668-2149414984","user_name":"janedoe"}],"behaviors_processed":["pid:6e36ac138a7a426fa5d2e4a45da72961:2281794660807:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T09:06:17.051656144Z","date_updated":"2024-07-19T09:06:24Z","detection_id":"ldt:6e36ac138a7a426fa5d2e4a45da72961:223339237035","device":{"agent_load_flags":"0","agent_local_time":"2024-07-17T07:18:20.541Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.28.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"6e36ac138a7a426fa5d2e4a45da72961","external_ip":"99.56.191.170","first_seen":"2023-03-13T11:34:15Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"JBETRO-LT4","last_login_timestamp":"2024-07-19T05:29:58Z","last_login_user":"janedoe","last_seen":"2024-07-19T08:47:56Z","local_ip":"70.172.9.75","mac_address":"00-ff-c0-d6-f8-46","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T08:48:28Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Dell G15 5511"},"email_sent":false,"first_behavior":"2024-07-19T09:06:08Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T09:06:08Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"}
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: JBETRO-LT4 clientmac: 00-ff-c0-d6-f8-46 filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 filename: explorer.exe filepath: \Device\HarddiskVolume3\Windows\explorer.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 70.172.9.75 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=153.151.81.16 ::: userName=charlie ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"153.151.81.16","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: streamName=Crowdstrike Detection ::: fileName=dllhost.exe ::: program=crowdstrike_falcon
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0", "filename": "dllhost.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe", "message": "WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=153.151.81.16 ::: userName=charlie ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_macmeine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:26Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:33.847795046Z\",\"date_updated\":\"2024-07-19T12:56:40Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@acmeelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"153.151.81.16\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:26Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:26Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: streamName=Crowdstrike Detection ::: fileName=dllhost.exe ::: program=crowdstrike_falcon", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "153.151.81.16", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=153.151.81.16 ::: userName=charlie ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"153.151.81.16","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: streamName=Crowdstrike Detection ::: fileName=dllhost.exe ::: program=crowdstrike_falcon
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=153.151.81.16 ::: userName=charlie ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_macmeine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@acmeelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"153.151.81.16","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: streamName=Crowdstrike Detection ::: fileName=dllhost.exe ::: program=crowdstrike_falcon
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 filename: dllhost.exe filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 153.151.81.16 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=42.141.36.245 ::: userName=nighthawk ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"42.141.36.245","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: streamName=Crowdstrike Detection ::: fileName=dllhost.exe ::: program=crowdstrike_falcon
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0", "filename": "dllhost.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe", "message": "WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=42.141.36.245 ::: userName=nighthawk ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mwayneine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:26Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"nighthawk\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:33.847795046Z\",\"date_updated\":\"2024-07-19T12:56:40Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@wayneelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"42.141.36.245\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:26Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:26Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe ::: streamName=Crowdstrike Detection ::: fileName=dllhost.exe ::: program=crowdstrike_falcon", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "42.141.36.245", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=42.141.36.245 ::: userName=nighthawk ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"42.141.36.245","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: streamName=Crowdstrike Detection ::: fileName=dllhost.exe ::: program=crowdstrike_falcon
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: clientIP=42.141.36.245 ::: userName=nighthawk ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244815666088","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:26Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"nighthawk"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848516147278:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:33.847795046Z","date_updated":"2024-07-19T12:56:40Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244815666088","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@wayneelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"42.141.36.245","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:26Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:26Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe ::: streamName=Crowdstrike Detection ::: fileName=dllhost.exe ::: program=crowdstrike_falcon
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 filename: dllhost.exe filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 42.141.36.245 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"243.147.13.59","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=explorer.exe ::: clientIP=243.147.13.59 ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: userName=janedoe ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: streamName=Crowdstrike Detection
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054", "filename": "explorer.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe", "message": "WitFoo-Artifact ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"janedoe\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"janedoe\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@oscorpelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"243.147.13.59\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileName=explorer.exe ::: clientIP=243.147.13.59 ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: userName=janedoe ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: streamName=Crowdstrike Detection", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "243.147.13.59", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"243.147.13.59","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=explorer.exe ::: clientIP=243.147.13.59 ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: userName=janedoe ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: streamName=Crowdstrike Detection
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"243.147.13.59","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=explorer.exe ::: clientIP=243.147.13.59 ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: userName=janedoe ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: streamName=Crowdstrike Detection
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 filename: explorer.exe filepath: \Device\HarddiskVolume3\Windows\explorer.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 243.147.13.59 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fileName=dllhost.exe ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: userName=janedoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"95.203.2.244","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: clientIP=95.203.2.244 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0", "filename": "dllhost.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe", "message": "WitFoo-Artifact ::: fileName=dllhost.exe ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: userName=janedoe ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"dllhost.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\System32\\\\dllhost.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"dfe1e4b1b8714cbe1005ee9413c2bae9\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"\",\"parent_md5\":\"\",\"parent_process_graph_id\":\"\",\"parent_sha256\":\"\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:12Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"janedoe\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:26.823543454Z\",\"date_updated\":\"2024-07-19T12:56:48Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@oscorpelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"95.203.2.244\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:12Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:56:12Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: program=crowdstrike_falcon ::: clientIP=95.203.2.244 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "95.203.2.244", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fileName=dllhost.exe ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: userName=janedoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"95.203.2.244","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: clientIP=95.203.2.244 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: fileName=dllhost.exe ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: fileHash=0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 ::: streamName=Crowdstrike Detection ::: clientMAC=00-15-5d-26-72-11 ::: userName=janedoe ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\system32\\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244814939971","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"dllhost.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\System32\\dllhost.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"dfe1e4b1b8714cbe1005ee9413c2bae9","objective":"Keep Access","parent_details":{"parent_cmdline":"","parent_md5":"","parent_process_graph_id":"","parent_sha256":""},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:12Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"janedoe"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30848487408928:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:26.823543454Z","date_updated":"2024-07-19T12:56:48Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244814939971","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"95.203.2.244","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:12Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:56:12Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: program=crowdstrike_falcon ::: clientIP=95.203.2.244 ::: filePath=\Device\HarddiskVolume3\Windows\System32\dllhost.exe
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0 filename: dllhost.exe filepath: \Device\HarddiskVolume3\Windows\System32\dllhost.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 95.203.2.244 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"81.208.223.102","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=explorer.exe ::: clientIP=81.208.223.102 ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: userName=alice ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: streamName=Crowdstrike Detection
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054", "filename": "explorer.exe", "filepath": "\\Device\\HarddiskVolume3\\Windows\\explorer.exe", "message": "WitFoo-Artifact ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mstarkine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@starkelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"81.208.223.102\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: fileName=explorer.exe ::: clientIP=81.208.223.102 ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: userName=alice ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\\Device\\HarddiskVolume3\\Windows\\explorer.exe ::: streamName=Crowdstrike Detection", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "81.208.223.102", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"81.208.223.102","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=explorer.exe ::: clientIP=81.208.223.102 ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: userName=alice ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: streamName=Crowdstrike Detection
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: fileHash=350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mstarkine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@starkelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"81.208.223.102","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: fileName=explorer.exe ::: clientIP=81.208.223.102 ::: clientMAC=00-15-5d-26-72-11 ::: program=crowdstrike_falcon ::: userName=alice ::: messageType=endpoint_protection_event ::: clientHostname=SSTEWART-LT3 ::: filePath=\Device\HarddiskVolume3\Windows\explorer.exe ::: streamName=Crowdstrike Detection
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054 filename: explorer.exe filepath: \Device\HarddiskVolume3\Windows\explorer.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 81.208.223.102 userName: alice
Explain this syslog message
WitFoo-Artifact ::: program=crowdstrike_falcon ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"119.46.205.92","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientIP=119.46.205.92 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: userName=charlie
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-15-5d-26-72-11", "filehash": "1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60", "filename": "pwsh.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe", "message": "WitFoo-Artifact ::: program=crowdstrike_falcon ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"explorer.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Windows\\\\explorer.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"d264f62721590f14bc54344f48a05912\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\system32\\\\userinit.exe\",\"parent_md5\":\"5cdc907c7818fbaa658fc9f2abb238f1\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292\",\"parent_sha256\":\"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:56:10Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"},{\"alleged_filetype\":\"exe\",\"behavior_id\":\"10381\",\"cmdline\":\"\\\"C:\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\\\" -WorkingDirectory ~\",\"confidence\":80,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"description\":\"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"FileSystemTamperFalconSensorDynamicConfiguration\",\"filename\":\"pwsh.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files\\\\PowerShell\\\\7\\\\pwsh.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"cab368ed200c5b7e3ff38bca123b6d7b\",\"objective\":\"Keep Access\",\"parent_details\":{\"parent_cmdline\":\"C:\\\\WINDOWS\\\\Explorer.EXE\",\"parent_md5\":\"d264f62721590f14bc54344f48a05912\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348\",\"parent_sha256\":\"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054\"},\"pattern_disposition\":32768,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":true,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":false,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_moscorpine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"suspicious_activity\",\"severity\":70,\"sha256\":\"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60\",\"tactic\":\"Defense Evasion\",\"tactic_id\":\"TA0005\",\"technique\":\"Disable or Modify Tools\",\"technique_id\":\"T1562.001\",\"template_instance_id\":\"2933\",\"timestamp\":\"2024-07-19T12:57:19Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"charlie\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381\",\"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-07-19T12:56:18.663491715Z\",\"date_updated\":\"2024-07-19T12:57:33Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-07-19T01:14:12.642Z\",\"agent_version\":\"7.15.18513.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18513\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"97.180.62.75\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-06-23T23:05:20Z\",\"last_login_user\":\"sstewart@oscorpelectric.com\",\"last_seen\":\"2024-07-19T12:48:38Z\",\"local_ip\":\"119.46.205.92\",\"mac_address\":\"00-15-5d-26-72-11\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-07-19T12:48:50Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-07-19T12:56:10Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-07-19T12:57:19Z\",\"max_confidence\":80,\"max_severity\":70,\"max_severity_displayname\":\"High\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: clientIP=119.46.205.92 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: userName=charlie", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "119.46.205.92", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: program=crowdstrike_falcon ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"119.46.205.92","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientIP=119.46.205.92 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: userName=charlie
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: program=crowdstrike_falcon ::: fileHash=1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 ::: fileName=pwsh.exe ::: filePath=\Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"C:\\WINDOWS\\Explorer.EXE","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"explorer.exe","filepath":"\\Device\\HarddiskVolume3\\Windows\\explorer.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"d264f62721590f14bc54344f48a05912","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\system32\\userinit.exe","parent_md5":"5cdc907c7818fbaa658fc9f2abb238f1","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847093154292","parent_sha256":"0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:56:10Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"},{"alleged_filetype":"exe","behavior_id":"10381","cmdline":"\"C:\\Program Files\\PowerShell\\7\\pwsh.exe\" -WorkingDirectory ~","confidence":80,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:244813137472","description":"A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"FileSystemTamperFalconSensorDynamicConfiguration","filename":"pwsh.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files\\PowerShell\\7\\pwsh.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"cab368ed200c5b7e3ff38bca123b6d7b","objective":"Keep Access","parent_details":{"parent_cmdline":"C:\\WINDOWS\\Explorer.EXE","parent_md5":"d264f62721590f14bc54344f48a05912","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348","parent_sha256":"350570713e0a7e3733f59623f880a442e98979b29a8d59b95555625a38ed1054"},"pattern_disposition":32768,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":true,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":false,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_moscorpine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"suspicious_activity","severity":70,"sha256":"1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60","tactic":"Defense Evasion","tactic_id":"TA0005","technique":"Disable or Modify Tools","technique_id":"T1562.001","template_instance_id":"2933","timestamp":"2024-07-19T12:57:19Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"charlie"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:30847100571348:10381","pid:3810ea13b98a42adb0ff227fbaf6169f:30848565445369:10381"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-07-19T12:56:18.663491715Z","date_updated":"2024-07-19T12:57:33Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:244813137472","device":{"agent_load_flags":"1","agent_local_time":"2024-07-19T01:14:12.642Z","agent_version":"7.15.18513.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18513","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"97.180.62.75","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-06-23T23:05:20Z","last_login_user":"sstewart@oscorpelectric.com","last_seen":"2024-07-19T12:48:38Z","local_ip":"119.46.205.92","mac_address":"00-15-5d-26-72-11","major_version":"10","minor_version":"0","modified_timestamp":"2024-07-19T12:48:50Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-07-19T12:56:10Z","hostinfo":{"domain":""},"last_behavior":"2024-07-19T12:57:19Z","max_confidence":80,"max_severity":70,"max_severity_displayname":"High","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: clientIP=119.46.205.92 ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: clientMAC=00-15-5d-26-72-11 ::: userName=charlie
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-15-5d-26-72-11 filehash: 1617dbc49cb323ef31c7caea831fe8b9aa9b79ed88eaab0c1febcc169e3abc60 filename: pwsh.exe filepath: \Device\HarddiskVolume3\Program Files\PowerShell\7\pwsh.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 119.46.205.92 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: fileName=triPOS Setup.exe ::: messageType=endpoint_protection_event ::: clientMAC=00-ff-c8-e9-2f-db ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attwayneed=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"alice","last_seen":"2024-05-10T15:27:29Z","local_ip":"21.105.31.185","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: userName=alice ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cwaynee\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: clientIP=21.105.31.185 ::: program=crowdstrike_falcon ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: streamName=Crowdstrike Detection
{ "clienthostname": "SSTEWART-LT3", "clientmac": "00-ff-c8-e9-2f-db", "filehash": "978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b", "filename": "triPOS Setup.exe", "filepath": "\\Device\\HarddiskVolume3\\ProgramData\\Package Cache\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe", "message": "WitFoo-Artifact ::: fileName=triPOS Setup.exe ::: messageType=endpoint_protection_event ::: clientMAC=00-ff-c8-e9-2f-db ::: clientHostname=SSTEWART-LT3 ::: message={\"behaviors\":[{\"alleged_filetype\":\"exe\",\"behavior_id\":\"458\",\"cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Cwaynee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776\",\"confidence\":60,\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"filename\":\"triPOS Setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\ProgramData\\\\Package Cwaynee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\",\"ioc_description\":\"\",\"ioc_source\":\"\",\"ioc_type\":\"\",\"ioc_value\":\"\",\"md5\":\"6468e92d1ad408df05df38c1192de790\",\"objective\":\"Follow Through\",\"parent_details\":{\"parent_cmdline\":\"\\\"C:\\\\ProgramData\\\\Package Cwaynee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.clean.room=\\\"C:\\\\ProgramData\\\\Package Cwaynee\\\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\\\triPOS Setup.exe\\\" -burn.filehandle.attwayneed=536 -burn.filehandle.self=544 /uninstall\",\"parent_md5\":\"6468e92d1ad408df05df38c1192de790\",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295\",\"parent_sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"blocking_unsupported_or_disabled\":false,\"bootup_safeguard_enabled\":false,\"critical_process_disabled\":false,\"detect\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"inddet_mask\":false,\"indicator\":false,\"kill_action_failed\":false,\"kill_parent\":false,\"kill_process\":false,\"kill_subprocess\":false,\"operation_blocked\":true,\"policy_disabled\":false,\"process_blocked\":false,\"quarantine_file\":false,\"quarantine_mwayneine\":false,\"registry_operation_blocked\":false,\"rooting\":false,\"sensor_only\":false,\"suspend_parent\":false,\"suspend_process\":false},\"scenario\":\"ransomware\",\"severity\":50,\"sha256\":\"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"timestamp\":\"2024-05-10T15:46:45Z\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"user_name\":\"alice\"}],\"behaviors_processed\":[\"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458\"],\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"created_timestamp\":\"2024-05-10T15:46:52.112770748Z\",\"date_updated\":\"2024-05-10T15:46:56Z\",\"detection_id\":\"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482\",\"device\":{\"agent_load_flags\":\"1\",\"agent_local_time\":\"2024-05-08T23:47:06.818Z\",\"agent_version\":\"7.13.18308.0\",\"bios_manufacturer\":\"Dell Inc.\",\"bios_version\":\"1.21.0\",\"cid\":\"47b7f823f5804dd9862681183ba9999d\",\"config_id_base\":\"65994763\",\"config_id_build\":\"18308\",\"config_id_platform\":\"3\",\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"external_ip\":\"75.231.140.51\",\"first_seen\":\"2023-03-10T14:06:56Z\",\"groups\":[\"6297e232e6564507aa02babd05cadd3c\"],\"hostname\":\"SSTEWART-LT3\",\"last_login_timestamp\":\"2024-05-09T03:50:36Z\",\"last_login_user\":\"alice\",\"last_seen\":\"2024-05-10T15:27:29Z\",\"local_ip\":\"21.105.31.185\",\"mac_address\":\"00-ff-c8-e9-2f-db\",\"major_version\":\"10\",\"minor_version\":\"0\",\"modified_timestamp\":\"2024-05-10T15:29:07Z\",\"os_version\":\"Windows 10\",\"platform_id\":\"0\",\"platform_name\":\"Windows\",\"product_type\":\"1\",\"product_type_desc\":\"Workstation\",\"status\":\"normal\",\"system_manufacturer\":\"Dell Inc.\",\"system_product_name\":\"Latitude 5511\"},\"email_sent\":false,\"first_behavior\":\"2024-05-10T15:46:45Z\",\"hostinfo\":{\"domain\":\"\"},\"last_behavior\":\"2024-05-10T15:46:45Z\",\"max_confidence\":60,\"max_severity\":50,\"max_severity_displayname\":\"Medium\",\"seconds_to_resolved\":0,\"seconds_to_triaged\":0,\"show_in_ui\":true,\"status\":\"new\"} ::: userName=alice ::: filePath=\\Device\\HarddiskVolume3\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe ::: clientIP=21.105.31.185 ::: program=crowdstrike_falcon ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: streamName=Crowdstrike Detection", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "program": "crowdstrike_falcon", "senderhost": "kafka.precinct", "sensitivity": "normal", "sourceinfo": "unknown", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "21.105.31.185", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: fileName=triPOS Setup.exe ::: messageType=endpoint_protection_event ::: clientMAC=00-ff-c8-e9-2f-db ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attwayneed=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"alice","last_seen":"2024-05-10T15:27:29Z","local_ip":"21.105.31.185","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: userName=alice ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cwaynee\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: clientIP=21.105.31.185 ::: program=crowdstrike_falcon ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: streamName=Crowdstrike Detection
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: fileName=triPOS Setup.exe ::: messageType=endpoint_protection_event ::: clientMAC=00-ff-c8-e9-2f-db ::: clientHostname=SSTEWART-LT3 ::: message={"behaviors":[{"alleged_filetype":"exe","behavior_id":"458","cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -q -burn.elevated BurnPipe.{157CF558-98A5-411B-B7A5-99D480459896} {CED9AE2D-1FF1-49C4-B123-2E248FB6B4F0} 29776","confidence":60,"control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:154619006482","description":"A process attempted to delete a Volume Shadow Snapshot.","device_id":"3810ea13b98a42adb0ff227fbaf6169f","display_name":"VolumeShadowSnapshotDeleted","filename":"triPOS Setup.exe","filepath":"\\Device\\HarddiskVolume3\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe","ioc_description":"","ioc_source":"","ioc_type":"","ioc_value":"","md5":"6468e92d1ad408df05df38c1192de790","objective":"Follow Through","parent_details":{"parent_cmdline":"\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.clean.room=\"C:\\ProgramData\\Package Cwaynee\\{0f788410-644e-4b6e-8a93-8014fcfa3383}\\triPOS Setup.exe\" -burn.filehandle.attwayneed=536 -burn.filehandle.self=544 /uninstall","parent_md5":"6468e92d1ad408df05df38c1192de790","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826319327295","parent_sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b"},"pattern_disposition":1024,"pattern_disposition_details":{"blocking_unsupported_or_disabled":false,"bootup_safeguard_enabled":false,"critical_process_disabled":false,"detect":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"inddet_mask":false,"indicator":false,"kill_action_failed":false,"kill_parent":false,"kill_process":false,"kill_subprocess":false,"operation_blocked":true,"policy_disabled":false,"process_blocked":false,"quarantine_file":false,"quarantine_mwayneine":false,"registry_operation_blocked":false,"rooting":false,"sensor_only":false,"suspend_parent":false,"suspend_process":false},"scenario":"ransomware","severity":50,"sha256":"978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","timestamp":"2024-05-10T15:46:45Z","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","user_name":"alice"}],"behaviors_processed":["pid:3810ea13b98a42adb0ff227fbaf6169f:22826338144393:458"],"cid":"47b7f823f5804dd9862681183ba9999d","created_timestamp":"2024-05-10T15:46:52.112770748Z","date_updated":"2024-05-10T15:46:56Z","detection_id":"ldt:3810ea13b98a42adb0ff227fbaf6169f:154619006482","device":{"agent_load_flags":"1","agent_local_time":"2024-05-08T23:47:06.818Z","agent_version":"7.13.18308.0","bios_manufacturer":"Dell Inc.","bios_version":"1.21.0","cid":"47b7f823f5804dd9862681183ba9999d","config_id_base":"65994763","config_id_build":"18308","config_id_platform":"3","device_id":"3810ea13b98a42adb0ff227fbaf6169f","external_ip":"75.231.140.51","first_seen":"2023-03-10T14:06:56Z","groups":["6297e232e6564507aa02babd05cadd3c"],"hostname":"SSTEWART-LT3","last_login_timestamp":"2024-05-09T03:50:36Z","last_login_user":"alice","last_seen":"2024-05-10T15:27:29Z","local_ip":"21.105.31.185","mac_address":"00-ff-c8-e9-2f-db","major_version":"10","minor_version":"0","modified_timestamp":"2024-05-10T15:29:07Z","os_version":"Windows 10","platform_id":"0","platform_name":"Windows","product_type":"1","product_type_desc":"Workstation","status":"normal","system_manufacturer":"Dell Inc.","system_product_name":"Latitude 5511"},"email_sent":false,"first_behavior":"2024-05-10T15:46:45Z","hostinfo":{"domain":""},"last_behavior":"2024-05-10T15:46:45Z","max_confidence":60,"max_severity":50,"max_severity_displayname":"Medium","seconds_to_resolved":0,"seconds_to_triaged":0,"show_in_ui":true,"status":"new"} ::: userName=alice ::: filePath=\Device\HarddiskVolume3\ProgramData\Package Cwaynee\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe ::: clientIP=21.105.31.185 ::: program=crowdstrike_falcon ::: fileHash=978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b ::: streamName=Crowdstrike Detection
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3 clientmac: 00-ff-c8-e9-2f-db filehash: 978ff3ff4d68cd1084e12aca5914bdfd1797e56173b604d13a1ae7d58909be9b filename: triPOS Setup.exe filepath: \Device\HarddiskVolume3\ProgramData\Package Cache\{0f788410-644e-4b6e-8a93-8014fcfa3383}\triPOS Setup.exe messagetype: endpoint_protection_event productids: [7] program: crowdstrike_falcon senderhost: kafka.precinct sensitivity: normal sourceinfo: unknown tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 21.105.31.185 userName: alice
Explain this syslog message